Understand how Cryptographic Erase sanitizes encryption keys to prevent access to encrypted data, as defined by NIST guidelines.
Under Section 3.2 of NIST SP 800-88 Rev.2, Cryptographic Erase (CE) is a purge sanitization technique that sanitizes the key used to encrypt data or prevents access to this key. By erasing the key itself, access to the encrypted information is prevented, leaving the encrypted data (ciphertext) on the storage media.
Since CE performs key sanitization, it is comparatively faster than other sanitization techniques and has high assurance. Many storage media today have integrated symmetric-key encryption that is always active and encrypts all stored data. Self-encrypting drives (SEDs) are one example that usually includes sanitization capabilities.
The cryptographic algorithm and its mode of operation must be designed and implemented to ensure that no unauthorized party can determine the decryption key or recover the plaintext without possessing the legitimate decryption key.
NIST SP 800-88 R2 cites ISO/IEC 27040 for referring to the strength of cryptography:
CE is only limited to sanitizing keys corresponding to encrypted data. Therefore, it is a prerequisite that no sensitive data has previously been stored in non-encrypted form (plaintext) on the storage media. Sanitization of sensitive data stored in plaintext requires the use of other sanitization techniques like overwriting.
For successful implementation of cryptographic erasure, organizations must have a systematic process for recording media devices encrypted using strong cryptographic algorithms along with a log of encryption keys. D-Secure supports cryptographic erasure as prescribed by NIST 800-88 R2.
Implements cryptographic erasure according to NIST SP 800-88 Rev.2 guidelines
Performs verification after CE to ensure keys have been securely erased
Works with self-encrypting drives and other encrypted storage media
Generates tamper-proof certificates for compliance documentation
Cryptographic Erase is a fast and effective sanitization technique for encrypted storage media when implemented correctly according to NIST guidelines. Organizations must use professional data-wiping tools that support cryptographic erasure and perform verification to ensure keys have been securely erased and data is no longer accessible.
Ensure secure key sanitization with D-Secure's NIST SP 800-88 Rev.2 compliant cryptographic erasure.
Your email address will not be published. Providing an email is optional.
Send us an enquiry regarding: Cryptographic Erase
No comments yet. Be the first to comment.