Skip to main content
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.
NetApp Knowledge Base

How to cryptographically sanitize a system with all self-encrypting disks (SEDs)

Views:
315
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
core
Last Updated:

Applies to

  • SED
  • NSE
  • Encryption

Description

 Sanitizing one or more self-encrypting disks (SEDs), renders the existing data on the SEDs impossible to retrieve. This operation employs the inherent erase capability of SEDs to perform all of the following changes:

  • Changes the disk encryption key to a new random value
  • Resets the power-on lock state to false
  • Sets the data authentication key (AK) to the default manufacture secure ID (MSID).
 
There is no method to restore the disk encryption key to its previous value, meaning that you cannot recover the data on the SED.
 
Use this command with extreme care.
 

 

Scan to view the article on your device

 

  • Was this article helpful?