Content deleted Content added
Knguyeniii (talk | contribs) |
Knguyeniii (talk | contribs) No edit summary |
||
Line 26:
With Cryptographic Disk Erasure the drive is commanded, with proper authentication credentials, to self-generate a new media encryption key and go into a 'new drive' state. Unlike other forms of sanitization, this action takes a few milliseconds at most. So a drive can be safely repurposed very quickly.
===Security Challenges===
* Pure hardware-based FDE does not have any strong authentication component
* Lack of scalable management; no central management component
==See also==
|