Destroy

Get Certified Get Ahead

In this Recommendation, to destroy is an action applied to a key or a piece of secret data. After a key or a piece of secret data is destroyed, no information about its value can be recovered. 

See NIST SP 800-56A Rev. 2 under Destroy for more information. 
 
An action applied to a key or a piece of (secret) data. In this Recommendation, after a key or a piece of data is destroyed, no information about its value can be recovered. 

See NIST SP 800-56B Rev. 1 under Destroy for more information. 
 
A method of Sanitization that renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data. 
 
See NIST SP 800-88 Rev. 1  under Destroy for more information. 

Share this Post