Keys should be generated, stored and managed securely to stop compromise. These keys are applied with encryption algorithms like RSA or AES. a similar algorithm is useful for the two encryption and decryption, but unique keys are utilised. Securing Data at Rest with Encryption Data at rest refers to details that is stored and saved with a physical