These controls are only legitimate whilst the data is at rest. the moment it’s accessed or moved, DLP protections for the other states of data will use.
whilst the danger profile for data in transit and data in use https://zaynabbprt617034.wssblogs.com/31173841/indicators-on-trusted-execution-environment-you-should-know