Abstract
Public disclosures of data “indiscretions” have become regular enough and embarrassing enough that many organizations are exploring encryption options to simply stay out of the headlines. However getting the most out of encryption involves much more than purchasing a device with encryption features and connecting it to an existing storage infrastructure. Existing management and control structures will need to evolve, information locations changed, and support is even required from the legal department! This paper defines a nine-step process that should be performed to effectively implement at-rest data encryption. While not all steps will be needed in all cases, they each merit consideration in every case