We provide a bunch of features relevant to this:
1) Our auto-reboot feature automatically getting data back at rest after locking, with the default of 18 hours after locking (you can make it as low as 10 minutes).
2) Our recently added low-level USB-C port control on Tensor Pixels which even disables the data lines in hardware, with the default of disabling USB data in After First Unlock state when the device is locked (you can disable it in Before First Unlock state too along, set it as charging-only or even completely disable USB including charging while the OS is booted to even eliminate the charging protocol attack surface).
3) Our recently added full compacting garbage collection in system_server/SystemUI on the device locks.
4) Our large amount of generic exploit protection improvements including hardened_malloc, hardware memory tagging integrated into hardened_malloc and enabled by default, BTI/PAC and lots of other assorted kernel/userspace hardening along with a minor amount of additional firmware hardening through attack surface reduction. Attack surface reduction features such as Wi-Fi/Bluetooth auto-turn-off are also relevant.
You can see that the first feature gets the data back at rest after a timer elapses after locking if there isn't a successful unlock first, and everything else combines to secure the device against attacks.
Improvements to OS and firmware security are shipping in the stock OS for the April release based on our upstream vulnerability reports / suggestions to make things even better, including reset attack mitigation protection for the firmware fastboot mode by having it zero all memory before activating USB.