A way to assure data at-rest is secure even in the event of loss or theft is to use:
Full device encryption.
Special permissions on the file system.
Trusted Platform Module integration.
Access Control Lists.
Device encryption encrypts the data on the device. This feature ensures that the data on the device cannot be
accessed in a useable form should the device be stolen.