Objective 3.3High10 min

Data States

Understanding the three states of data: at rest (stored), in transit (moving), and in use (being processed). Security considerations, vulnerabilities, and protection methods for each state.

Understanding Data States

Data exists in three states, each with unique security challenges and protection requirements. Comprehensive data protection requires securing data in ALL three states—a gap in any one creates vulnerability.

The three data states:At rest — Stored data (databases, files, backups) • In transit — Moving data (network transfers, emails) • In use — Data being processed (in memory, CPU)

The 2019 Capital One breach exploited a misconfigured WAF to access S3 buckets containing data at rest. While the data was encrypted at rest, the attacker obtained credentials that could decrypt it—demonstrating that encryption alone isn't enough if access controls fail.

Each data state requires appropriate controls; neglecting any state creates attack opportunities.

Why This Matters for the Exam

Data states are heavily tested on SY0-701 because different states require different protections. Questions cover appropriate controls for each state and understanding vulnerabilities.

Understanding data states helps with encryption strategy, network security, and compliance requirements. Many regulations specifically require protection at rest and in transit.

The exam tests recognition of data states and appropriate protection methods.

Deep Dive

What Is Data at Rest?

Data at rest is stored data that isn't actively being transferred or processed.

Data at Rest Locations:

LocationExamples
DatabasesSQL databases, NoSQL stores
File systemsNetwork shares, local drives
BackupsTape, disk, cloud backups
ArchivesLong-term storage
Removable mediaUSB drives, external drives
Cloud storageS3, Azure Blob, Google Cloud

Data at Rest Threats:

ThreatDescription
Physical theftDevice or media stolen
Unauthorized accessImproper permissions
Insider threatMalicious employee
Backup exposureUnencrypted backups
DecommissioningData on disposed devices

Data at Rest Protection:

Primary: Encryption
- Full disk encryption (FDE)
- File-level encryption
- Database encryption (TDE)
- Backup encryption

Supporting controls:
- Access controls
- Physical security
- Secure disposal
- Key management

What Is Data in Transit?

Data in transit (or in motion) is data being transferred between systems.

Data in Transit Scenarios:

ScenarioExample
Network transferFile downloads, API calls
EmailMessage transmission
Web browsingHTTPS traffic
Remote accessVPN tunnels
Database queriesClient-server communication
Cloud syncData replication

Data in Transit Threats:

ThreatDescription
EavesdroppingPacket capture, sniffing
Man-in-the-middleIntercepting and modifying
Session hijackingTaking over connections
Replay attacksReusing captured data
DNS spoofingRedirecting traffic

Data in Transit Protection:

Primary: Encryption
- TLS/SSL for web traffic
- IPSec for VPN tunnels
- SSH for remote access
- S/MIME or PGP for email

Supporting controls:
- Certificate validation
- Perfect forward secrecy
- Strong cipher suites
- Network segmentation

What Is Data in Use?

Data in use is actively being processed in memory or by the CPU.

Data in Use Scenarios:

ScenarioDescription
Application processingData in application memory
Database queriesData during query execution
Document editingOpen file in memory
DecryptionData temporarily unencrypted
AnalyticsData being analyzed

Data in Use Threats:

ThreatDescription
Memory scrapingReading RAM for sensitive data
Cold boot attacksFreezing RAM to preserve data
Side-channel attacksSpectre, Meltdown exploits
Process injectionInjecting code into processes
Debug/dump accessMemory dump analysis

Data in Use Protection:

Emerging technologies:
- Confidential computing (encrypted memory)
- Hardware security modules (HSMs)
- Trusted execution environments (TEEs)
- Intel SGX enclaves

Traditional controls:
- Process isolation
- Memory protection
- Secure coding practices
- Endpoint protection

How Do the Three States Compare?

State Comparison:

AspectAt RestIn TransitIn Use
LocationStorageNetworkMemory/CPU
Main threatTheft/accessInterceptionScraping
Primary controlStorage encryptionTransport encryptionMemory protection
MaturityWell establishedWell establishedEmerging
Compliance focusHighHighGrowing

Protection Technology by State:

StateTechnologies
At restAES, BitLocker, LUKS, TDE
In transitTLS, IPSec, SSH, HTTPS
In useSGX, SEV, TrustZone, HSM

What Are Common Protection Gaps?

Gap Analysis:

❌ Encrypt in transit, not at rest
   → Data vulnerable when stored

❌ Encrypt at rest, not in transit  
   → Data vulnerable during transfer

❌ Both encrypted, but not in use
   → Data vulnerable during processing

✓ All three states protected
   → Comprehensive data protection

Common Gaps:

GapRiskExample
Unencrypted backupsBackup theftTapes stolen during transport
HTTP instead of HTTPSEavesdroppingLogin credentials captured
Clear text in memoryMemory attacksCredit cards scraped from RAM
TLS terminationUnencrypted internalData exposed after load balancer

How CompTIA Tests This

Example Analysis

Scenario: A company processes credit card payments. They encrypt the database (data at rest) and use TLS for customer connections (data in transit). During a security assessment, point-of-sale malware is discovered that captures card data from memory during transactions.

Analysis - Data State Vulnerability:

Protection Status:

StateProtected?Method
At rest✓ YesDatabase encryption
In transit✓ YesTLS encryption
In use❌ NoNo memory protection

The Attack:

Customer swipes card
        ↓
Data encrypted in transit (TLS) ✓
        ↓
Data decrypted for processing ← VULNERABLE
        ↓
Malware scrapes memory → Data stolen
        ↓
Data encrypted at rest (never reached)

Why Traditional Encryption Didn't Help:

  • TLS protects network transfer—data reaches server safely
  • Database encryption protects stored data—but data never stored
  • Processing requires decryption—data exposed in memory
  • Malware captures data during processing window

Improved Protection:

LayerControl
Endpoint securityAnti-malware, EDR
Memory protectionPoint-to-point encryption
Application hardeningSecure coding, input validation
Process isolationSandboxing, segmentation
Hardware securityHSM for key operations

PCI-DSS Perspective:

PCI requires:
- Encryption in transit (TLS) ✓
- Encryption at rest (storage) ✓
- Point-to-point encryption (P2PE) for reduced scope
- Memory protection increasingly expected

Key insight: Protecting two states doesn't protect the third. RAM-scraping malware targets the data-in-use gap that exists in most environments. Comprehensive protection requires addressing all three states.

Key Terms

data statesdata at restdata in transitdata in useencryptionTLSstorage encryptiondata protection

Common Mistakes

Encrypting only one or two states—attackers target the unprotected state. All three states need protection.
Forgetting TLS termination exposure—data may be decrypted at load balancer and travel unencrypted internally.
Assuming encryption prevents all attacks—encryption protects against interception, not all threats. Access controls matter too.
Ignoring data in use—this is the hardest state to protect but increasingly targeted by sophisticated attackers.

Exam Tips

Data at rest = stored (database, files, backups). Protected by storage encryption like AES, BitLocker, TDE.
Data in transit = moving (network). Protected by transport encryption like TLS, IPSec, SSH.
Data in use = processing (memory, CPU). Hardest to protect. Emerging solutions: SGX, confidential computing.
If a question describes data being "captured during processing," it's a data-in-use attack.
TLS termination at load balancer means data may be unencrypted on internal network—watch for this scenario.
Cold boot attack targets data in use by preserving RAM contents.

Memory Trick

The Three States - "RIM" or "RUN":

  • Rest = Sitting in storage (files, databases)
  • In motion/transit = Moving through network
  • Memory/in use = Being processed
  • Alternative:
  • Resting = At rest
  • Under transfer = In transit
  • Now processing = In use

Protection Technology Match: "Store with Storage encryption" (at rest) "Travel with TLS" (in transit) "Memory needs More work" (in use—emerging tech)

State Vulnerability: "Data is like water—it can leak from any container" - Storage container (at rest) - Pipe (in transit) - Cup while drinking (in use)

All three need to be secure!

Cold Boot Attack: "Cold boot = Capture RAM Of Live Data" Freezing RAM to preserve data in use

Common Gap: "Two out of three is still an F" Protecting only at rest + in transit leaves in use vulnerable

Test Your Knowledge

Q1.Point-of-sale malware captures credit card numbers while transactions are being processed. Which data state is being attacked?

Q2.Which encryption technology protects data in transit?

Q3.A company encrypts their database and uses HTTPS for all web traffic. What data state protection might they be missing?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee