Implementation Authenticated encryption details. Subkey Derivation and Authenticated Encryption Context headers Key Management Key Storage Providers Key Encryption At Rest Key Immutability and Changing Settings Key Storage Format Ephemeral data protection providers