Skip to main content

๐Ÿ’ผ 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.

  • Contextual name: ๐Ÿ’ผ 37 Decommissioning and destruction controls are typically used to ensure that information security is not compromised as information assets reach the end of their useful life. Examples include archiving strategies and the secure data deletion (that is, deleting data using techniques to ensure data is irrecoverable) of sensitive information prior to the disposal of information assets.
  • ID: /frameworks/apra-cpg-234/13/37
  • Located in: ๐Ÿ’ผ 13 Implementation of controls - Information security controls implemented at all stages

Descriptionโ€‹

Empty...

Similarโ€‹

  • Internal
    • ID: dec-c-5184f346

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags