Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The data at rest security policy will be applicable to application business sensitive data, covering the following aspects,

  • data at rest security policy activation flag
  • encryption algorithm
  • data handling policy
  • offline activation policy
  • key rotation policy
  • key Information

...

This specifies, the encryption algorithm to be used for data at rest security. [Ref. 1].

  • NoneNONE
  • AES256
  • ADIANTUM

Data handling policy

...

When is the Eve software is not able to contact the controller module, it will keep operating, using the last configuration received. When On power cycle, if the device is power cycled and not able to connect to the controller, the following options are available for the user. And it may require physical access to the device and/or user intervention. 

...