These controls are only legitimate though the data is at rest. as soon as it’s accessed or moved, DLP protections for another states of data will use.
The conversation included the necessity of appropriate governance https://haseebymgz229051.bloguerosa.com/29303095/what-does-encrypting-data-in-use-mean