๐ผ 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.
- Contextual name: ๐ผ 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.
- ID:
/frameworks/apra-cpg-234/13/37
- Located in: ๐ผ 13 Implementation of controls - Information security controls implemented at all stages
Descriptionโ
Empty...
Similarโ
- Internal
- ID:
dec-c-5184f346
- ID:
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|