Sveriges mest populära poddar
Framework: The Center for Internet Security (CIS) Top 18 Controls

Episode 17 — Safeguard 3.3 – Data encryption at rest and in transit

10 min18 oktober 2025

Safeguard 3.3 requires organizations to protect sensitive data through encryption, both when stored (at rest) and when moving across networks (in transit). Encryption transforms readable information into an unreadable form using cryptographic algorithms, ensuring that even if data is intercepted or stolen, it cannot be easily exploited. Encrypting data at rest protects information stored on servers, databases, laptops, or removable media from unauthorized access or loss. Encrypting data in transit safeguards it as it travels between systems, applications, and users—whether through email, APIs, or file transfers. Together, these measures uphold the confidentiality and integrity of information, a fundamental principle within cybersecurity frameworks. Modern encryption standards such as AES-256 for storage and TLS 1.3 for transmission are now baseline expectations for regulatory compliance across industries.

Effective encryption strategies extend beyond turning on a feature—they involve key management, configuration, and verification. Enterprises must use centrally managed key management systems (KMS) to control how cryptographic keys are generated, stored, rotated, and retired. Poor key management can undermine even the strongest algorithms. Encryption coverage must include portable devices and backups, since lost laptops or misconfigured cloud storage buckets are frequent sources of data breaches. Organizations should also ensure that encryption is transparent to legitimate users but impenetrable to unauthorized actors, balancing usability with protection. Regular audits of encryption settings and periodic penetration tests confirm effectiveness. As cyber threats evolve, encryption remains one of the most resilient and adaptable defenses, converting sensitive data from a high-value target into a controlled, inaccessible asset.
 Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.

Fler avsnitt av Framework: The Center for Internet Security (CIS) Top 18 Controls

Visa alla avsnitt av Framework: The Center for Internet Security (CIS) Top 18 Controls

Framework: The Center for Internet Security (CIS) Top 18 Controls med Jason Edwards finns tillgänglig på flera plattformar. Informationen på denna sida kommer från offentliga podd-flöden.