/*
Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

/*]]>*/

Zeroize

March 5, 2025

Zeroize

You are here:
< Back
cyber risk assessment insurance cybersecurity best practices define rmm authentication TPRM ecosystem flaw hypothesis methodology high assurance guard 3rd party third-party CISO What does Zeroize mean in cybersecurity?
this means erasing electronically stored data in a way that it cannot be retrieved.
What is the primary purpose of zeroization in a cryptographic device?
A method of erasing electronically stored data, cryptographic keys, and credentials service providers (CSPs) by altering or deleting the contents of the data storage to prevent recovery of the data. In this Recommendation, an action applied to a key or a piece of secret data.

DEFINITIONS

To remove or eliminate the key from a cryptographic equipment or fill device.
SOURCE: CNSSI-4009

To overwrite a memory location with data consisting entirely of bits with the value zero, so that the data is destroyed and not recoverable. This is often contrasted with deletion methods that merely destroy reference to data within a file system rather than the data itself.
SOURCE: SP 800-63

See NIST DEFINITION 

Used In A Sentence:

  • “Great work, Eugene… now we’re gonna have to zeroize everything to ensure your little “mistake’ doesn’t cause the breach of the century.”
  • Donna was so furious about her demotion to Purnima’s department, she zeroized all the router configurations in the Mumbai office.”

How does zeroization work?

Zeroization erases all potentially sensitive information in the router memory. This includes the erasure of the main memory, cache memories, and other memories containing packet data, NVRAM, and Flash memory. The Zeroization button on the faceplate is used to invoke zeroization.