Storage.com

data at rest

By Ben Lutkevich

What is data at rest?

Data at rest is data that has reached a destination and is not being accessed or used.

It typically refers to stored data and excludes data that is moving across a network or is temporarily in computer memory waiting to be read or updated. Data at rest can be archival or reference files that are rarely or never changed. It can also be data that is subject to regular but not constant change.

Hackers are an ever-present threat to data at rest. To keep unauthorized people from accessing, stealing or altering this data, security measures such as encryption and hierarchical password protection are commonly used. For some types of data, laws mandate specific security measures.

Data at rest is relatively easy to secure compared with data in motion and data in use.

Examples of data at rest

There are many types of data at rest, some examples include data stored in the following ways:

Data at rest is one of three states of data. The other two are:

  1. Data in motion. This data state is also called data in transit. It is data moving between systems or devices. Examples include data moving between virtual machines in cloud networks and data moving among devices on a virtual private network.
  2. Data in use. This state includes data that is being processed, accessed or read. For example, when a user requests access to their transaction history in a banking application, the transaction data is considered data in use.

Security concerns for data at rest

Data at rest is considered the easiest type to secure. Yet, it is still vulnerable to mistakes and malicious attacks. Those risks increase the longer data resides in storage or on a device.

Data at rest in mobile devices is at greater risk than data in other types of devices. Mobile devices are more distributed and, thus, more difficult to secure. Both factors make sensitive data stored on them more vulnerable to attacks.

For example, an employee storing sensitive company information on a mobile device could use that device on an insecure network. That puts the data at risk even if it isn't in use. If the device is hacked, attackers could access the stored data.

Using third-party services and distributed storage methods also raises risks to data at rest. The more places data is stored and the more entities that handle it, the more at risk it is. Organizations should assess the security policies of the third parties they entrust with their data. The integrity and challenges of a cloud storage provider's security ecosystem affect the data security of their customers. It's particularly important to understand where the provider's security responsibilities end and the customer's begin.

Organizations should also understand the security and data handling regulations of the country or countries where they physically store data. For example, the European Union's General Data Protection Regulation affects organizations that store their data in the EU and organizations that store the data on EU citizens outside of the EU.

Data breaches can be costly. Organizations could face financial and legal consequences if they become the victim of a data breach. They can also suffer reputation damage or lose customer trust.

Best practices and options for securing data at rest

Some best practices for securing data at rest include the following:

Data backups are a common destination for data at rest. Learn how IT admins can protect data backups from corruption, unauthorized access and leaks.

29 Oct 2021

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement