Which of the following approaches would NOT be considered sufficient to meet the requirements of secure data destruction within a cloud environment?
Deletion merely removes the pointers to data on a system; it does nothing to actually remove and sanitize the data. As such, the data remains in a recoverable state, and more secure methods are needed to ensure it has been destroyed and is not recoverable by another party.
Currently there are no comments in this discussion, be the first to comment!