The database encryption action operations that you can perform are described in the following subsections.