Encryption at Rest, in Transit, in Use, and Key Management

Key Takeaways

  • Encryption at rest protects stored data, while encryption in transit protects data moving across networks.
  • Encryption in use protects data during processing through methods such as secure enclaves, trusted execution environments, or confidential computing.
  • Symmetric encryption is fast for bulk data, while asymmetric encryption supports key exchange, signatures, and certificates.
  • Key management is often more important than the algorithm choice in exam scenarios.
  • Lost, exposed, reused, or poorly rotated keys can defeat otherwise strong encryption.
Last updated: April 2026

Encryption and Key Management

Encryption protects confidentiality by making data unreadable without the correct key. Security+ scenarios usually ask you to identify where encryption is needed and how keys should be protected.

Encryption by Data State

Data stateMeaningExample controls
At restStored on disk, database, object storage, backup, or mobile deviceFull disk encryption, database encryption, object storage encryption
In transitMoving across a networkTLS, HTTPS, IPsec VPN, SSH, SFTP
In useBeing processed in memory or CPUTrusted execution environment, secure enclave, confidential computing

At rest, think stolen laptop, lost drive, exposed storage bucket, or backup media. In transit, think interception, downgrade, or man-in-the-middle attack. In use, think protecting sensitive workloads while data is actively processed.

Crypto Building Blocks

ControlMain purposeExam clue
Symmetric encryptionFast bulk confidentialitySame key encrypts and decrypts
Asymmetric encryptionKey exchange, signatures, identity bindingPublic/private key pair
HashingIntegrity check, one-way digestSame input gives same digest
SaltDefends against precomputed password hash attacksUnique random value per password
Digital signatureIntegrity, authenticity, non-repudiationSender signs with private key
CertificateBinds a public key to an identityIssued by a certificate authority

Key Management Concepts

ConceptWhy it matters
KMSCentral service for generating, storing, rotating, and controlling keys
HSMTamper-resistant hardware for protecting high-value keys
Key rotationLimits exposure window if a key is compromised
Key escrowStores recovery keys under controlled access for continuity or legal need
Key destructionMakes encrypted data unrecoverable when keys are destroyed
Separation of dutiesPrevents one person from controlling every part of key use and recovery

Practical Scenario

A finance application stores payment records in a database and exports nightly backups to cloud object storage. Users connect through a web portal. The correct protection pattern is layered:

LocationGood control
Web connectionTLS with valid certificates
Database storageEncryption at rest with access controlled keys
Backup objectsSeparate backup encryption keys and restricted access
Admin accessMFA, logging, just-in-time access where available
Key storageKMS or HSM, not keys hardcoded in application files

Common Exam Traps

TrapBetter exam reasoning
"Hashing encrypts data."Hashing is one-way integrity protection, not reversible encryption.
"Private keys can be shared with partners."Public keys are shared; private keys must be protected.
"TLS protects data after it reaches the server."TLS protects transit, not storage or internal use after termination.
"Hardcoded keys are acceptable if the algorithm is strong."Key exposure defeats strong algorithms.

Quick Drill

Choose the best term:

  1. Protect a laptop if it is stolen: encryption at rest.
  2. Protect an API call across the internet: encryption in transit.
  3. Prove a software package was signed by the publisher: digital signature.
  4. Store high-value root keys: HSM.
  5. Make encrypted records unrecoverable without wiping every disk block: destroy the key.
Test Your Knowledge

A company encrypts database backups but stores the encryption key in the same backup folder. What is the primary weakness?

A
B
C
D
Test Your Knowledge

Which control best protects data while it is crossing an untrusted network?

A
B
C
D
Test Your KnowledgeMatching

Match each cryptographic concept to its primary use.

Match each item on the left with the correct item on the right

1
Hash
2
Digital signature
3
HSM
4
Symmetric key