A financial company utilizes a public cloud provider to store transactional data. Which method should the company implement to ensure the protection of this highly sensitive data while adhering to compliance with industry regulations for data at rest?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts