6 – How do you protect the data at rest?

See above