Your customers are concerned about the security of their sensitive data and their inquiry asks about what happens to old storage devices on AWS. What would be the best answer to this question?
A. AWS uses a 3rd party security organization to destroy data as part of the decommissioning pro-cess.
B. AWS uses the techniques detailed in DoD 5220.22-M to destroy data as part of the decommis-sioning process.
C. AWS reformats the disks and uses them again.
D. AWS uses their own proprietary software to destroy data as part of the decommissioning pro-cess.
A. AWS uses a 3rd party security organization to destroy data as part of the decommissioning pro-cess.
B. AWS uses the techniques detailed in DoD 5220.22-M to destroy data as part of the decommis-sioning process.
C. AWS reformats the disks and uses them again.
D. AWS uses their own proprietary software to destroy data as part of the decommissioning pro-cess.