💼 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.
- ID:
/frameworks/apra-cpg-234/13/37
Description​
Empty...
Similar​
- Internal
- ID:
dec-c-5184f346
- ID:
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
---|