Certified Cloud Security Professional – CCSP – Question252

In order to comply with regulatory requirements, which of the following secure erasure methods would be available to a cloud customer using volume storage within the IaaS service model?

A.
Demagnetizing
B. Shredding
C. Degaussing
D. Cryptographic erasure

Correct Answer: D

Explanation:

Explanation: Cryptographic erasure is a secure method to destroy data by destroying the keys that were used to encrypt it. This method is universally available for volume storage on IaaS and is also extremely quick. Shredding, degaussing, and demagnetizing are all physically destructive methods that would not be permitted within a cloud environment using shared resources.