A security architect for a large financial institution is preparing to decommission a legacy database system containing sensitive customer information. Which phase of the information system lifecycle should be most carefully planned to address the data protection concerns in this scenario?
Retirement/disposal is the correct phase to focus on when decommissioning a legacy system containing sensitive data. During this phase, the organization must ensure all sensitive customer information is properly sanitized from storage media, hardware is disposed of according to security policies, and any backup data is either securely archived or destroyed. Proper end-of-life procedures prevent data breaches that could occur if sensitive information remains accessible on discarded or repurposed equipment. The other phases (requirements analysis, architectural design, and operations/maintenance) are important but not specifically focused on the secure removal of a system from service.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are the best practices for data sanitization during the retirement/disposal phase?
Open an interactive chat with Bash
Why is proper hardware disposal important for data protection?
Open an interactive chat with Bash
What are the key considerations for securely archiving backup data?
Open an interactive chat with Bash
ISC2 CISSP
Security Architecture and Engineering
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access