An action applied to a key or a piece of secret data. After a key or a piece of secret data is destroyed, no information about its value can be recovered.
Sources:
FIPS 186-5
under Destroy
An action applied to a key or other piece of secret data. After a piece of secret data is destroyed, no information about its value can be recovered.
Sources:
FIPS 203
FIPS 204
An action applied to a key or a piece of secret data. After a key or a piece of secret data is destroyed, no information about its value can be recovered.
Sources:
FIPS 205
from
FIPS 186-5
A method of erasing electronically stored data, cryptographic keys, and credentials service providers (CSPs) by altering or deleting the contents of the data storage to prevent recovery of the data.
Sources:
CNSSI 4009-2015
under zeroization
from
FIPS 140-2
In this Recommendation, an action applied to a key or a piece of secret data. After a key or a piece of secret data is destroyed, no information about its value can be recovered. Also known as zeroization in FIPS 140.
Sources:
NIST SP 800-56B Rev. 2
under Destroy
A method of sanitization that renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data.
Sources:
CNSSI 4009-2015
from
NIST SP 800-88 Rev. 1
NIST SP 800-88 Rev. 1
under Destroy