The confidentiality, integrity, and availability of data at rest (data-at-rest) are protected.
Confidentiality, integrity, and availability of data in transit (data-in-transit) are protected.
Data backups are created, protected, maintained, and verified.