A company regularly replaces cryptographic components. However, older items are still found in system backups and logs following this process. Which method helps remove those items so they are not recoverable in stored archives?
Wipe the archived references by overwriting them in older records
Wait for the scheduled retirement cycle to finalize the disposal
Add a replacement component and allow the old data to remain in backups
Lock the logs with an access rule and update the key repository
Wiping or securely overwriting cryptographic references in archived logs and backups is the only effective method to ensure those elements are unrecoverable. Merely rotating keys, restricting access, or delaying disposal leaves the data intact and vulnerable to retrieval. Secure erasure follows guidance from data destruction standards like NIST SP 800-88 Rev. 1, especially critical in systems handling sensitive keying material.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the NIST SP 800-88 Rev. 1 standard?
Open an interactive chat with Bash
Why is overwriting necessary for cryptographic components?
Open an interactive chat with Bash
What is the risk of keeping old cryptographic components in backups?