This section describes how to manage the keystore and the master encryption key to guard against the threat of theft.