• Data encryption and masking.
  • Governance, auditing, and monitoring.