PR.DS-01 requires organizations to the confidentiality, integrity and availability of data-at-rest are protected. This NIST CSF 2.0 control falls under the Protect (PR) function and the Data Security category. Use this checklist to verify implementation and prepare evidence for auditors.
Control Details
- Control ID
- PR.DS-01
- Title
- Data-at-Rest Protection
- Function
- Protect (PR)
- Category
- Data Security
- Framework
- NIST CSF 2.0
The confidentiality, integrity and availability of data-at-rest are protected.
The confidentiality, integrity and availability of data-at-rest are protected. This includes encryption, access controls and integrity verification for stored data across all storage media.
Why This Matters
Data at rest is vulnerable to theft through physical access, insider threats and breach of storage systems. Encryption ensures that stolen data remains unreadable without the decryption keys.
Implementation Checklist
Use this checklist to verify your organization meets the requirements of PR.DS-01.
Evidence an Auditor Expects
Prepare the following documentation and artifacts to demonstrate compliance with PR.DS-01 during an audit.
- Encryption policy specifying algorithms and key lengths
- Endpoint encryption deployment reports showing coverage
- Key management system configuration and access logs
- Cloud storage encryption configuration screenshots
- Backup restoration test results
Common Gaps We Find
Based on our penetration testing and risk assessment engagements, these are the gaps organizations most frequently have with PR.DS-01.
- Endpoints have full-disk encryption but database encryption is not implemented
- Encryption keys are stored alongside the encrypted data
- Cloud storage buckets are created without encryption enabled by default
FAQ
What does PR.DS-01 require?
How do I prove compliance with PR.DS-01?
Need Help Meeting NIST CSF 2.0 Requirements?
Our penetration testing and risk assessments map directly to NIST CSF 2.0 controls. Sherlock Forensics identifies gaps in your compliance posture and provides actionable remediation guidance.
Get a Compliance Assessment