In the previous installments of this article series, I built a number of tools to establish an encryption key hierarchy: the Create Master Key (CRTMSTK) command, the Create Key Encrypting Key (CRTKEK) command, and the Create Data Encryption Key (CRTDTAK) command. In this installment, I put together all the pieces that I’ve provided so far and use these encryption key commands and a set of new functions to encrypt and decrypt sensitive data.