Skip to main content
3 events
when toggle format what by license comment
Oct 12, 2022 at 13:44 comment added erikbstack I would take as requirements from your explanation: - protect data at rest - protect data during transfer - protect keys - resilience, i.e. how does breaching one level of security impact the other levels and the overall security of the system What about data during processing? E.g. while the server encrypts data or sends data it is stored in memory and might be decrypted from the at-rest protection as well, while not being inside of the at-transfer protection. And should I distinguish different parts of the data based on usage and security needs?
Sep 10, 2013 at 21:15 vote accept SteAp
Sep 9, 2013 at 8:33 history answered Stephane CC BY-SA 3.0