Data lifecycle
1) Create 2) Store 3) Use 4) Share 5) Archive 6) Destroy
Data destruction
NIST guidelines (800-88): Clearing, Purging, Destroying
Data Clearing
Overwrites new data on top of sensitive data
Data Purging
More advanced clearing which may involve encrypting and degaussing to damage magnets
Data Destruction
Obliterates media
Destroying paper
Shredding, Pulping (reused with chemicals for recycling), Burned
Physical devices
Keep them encrypted to protect the data
USB data blockers
Prevent computers from recognizing removable USB devices
Theft protection
Locking cables, safes, vaults, laptop cabinets, identifying tags for return and indicating theft