From the course: Cloud Data, Platform, and Applications Security by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Phase 6: Destroy

Phase 6: Destroy

Phase six is the destroy phase, and that's what it's called in the CCSP lifecycle. You may see it as the disposition phase or the destruction phase, but we call it destroy. The data is no longer available or functional based on a wide variety of criteria, lifetime, its utility based on policy or governance and or regulations. Data can be disposed of using an assortment of methods, either physical or software-based when on-premises. However, on the exam, you need to remember that as a customer of a cloud provider, when you have data stored at the CSP, the only real practical and comprehensive solution is cryptographic erasure, otherwise known as crypto-shredding. important to note that crypto shredding really requires two crypto systems. One to encrypt the target data and then one to encrypt the resulting encryption keys. Now this varies from provider to provider so the CSPs will have their own established methods for disposal of data and media often using military-grade programs or…

Contents