An organization is implementing security controls for a database that contains sensitive user information. Which state should primarily be considered when encrypting this database to protect the confidentiality of its contents?
Encrypted storage
Data at rest
Data in use
Data in transit