A company regularly replaces cryptographic components. However, older items are still found in system backups and logs following this process. Which method helps remove those items so they are not recoverable in stored archives?
Add a replacement component and allow the old data to remain in backups
Lock the logs with an access rule and update the key repository
Wait for the scheduled retirement cycle to finalize the disposal
Wipe the archived references by overwriting them in older records
Wiping or securely overwriting cryptographic references in archived logs and backups is the only effective method to ensure those elements are unrecoverable. Merely rotating keys, restricting access, or delaying disposal leaves the data intact and vulnerable to retrieval. Secure erasure follows guidance from data destruction standards like NIST SP 800-88 Rev. 1, especially critical in systems handling sensitive keying material.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is secure erasure in cryptographic environments?
Open an interactive chat with Bash
What is NIST SP 800-88 Rev. 1, and why is it important?
Open an interactive chat with Bash
Why can't rotating keys or restricting access ensure cryptographic material is unrecoverable?