Hardware-based full disk encryption: Difference between revisions

Content deleted Content added
Knguyeniii (talk | contribs)
Knguyeniii (talk | contribs)
No edit summary
Line 26:
 
With Cryptographic Disk Erasure the drive is commanded, with proper authentication credentials, to self-generate a new media encryption key and go into a 'new drive' state. Unlike other forms of sanitization, this action takes a few milliseconds at most. So a drive can be safely repurposed very quickly.
 
===Security Challenges===
 
* Pure hardware-based FDE does not have any strong authentication component
* Lack of scalable management; no central management component
 
==See also==