- Automatic data anonymization
- Network encryption
- Integration with KMS
- Fine-grained access control with IAM