User Guide DDOC0199-000-A9
1-Slot Data Transport System (CSfC) 6 - 19 Encryption
© 2024 Curtiss-Wright Defense Solutions Revision 3.0
Zeroization affects only the crypto module HWE key. It does not affect the RMC module. The data
on the RMC module is still accessible:
• If the RMC module can be placed in another DTS1+ CSfC with the same DEK / EDEK loaded
in its crypto module.
• If the DEK can be restored / reloaded.
6.5.2 Delete SWE Container
CAUTION
LOSS OF CONTENT. Deletion of SWE container(s) will result in making the stored content
unrecoverable.
Refer to paragraph 6.4.1.5 Delete SWE Container (Unpartitioned Disk), paragraph 6.4.2.10
Delete SWE Container (Individual Partitions), and / or paragraph 6.4.2.11 Delete SWE
Containers (All Partitions) for detailed instructions on how to use the SWE passphrase delete
(rmcctl -D) commands.
6.5.3 RMC Purge
CAUTION
DATA SECURITY. The rmcpurge command does not affect the HWE key(s).
CAUTION
DATA SECURITY. Depending on the solid-state drive manufacturer, the rmcpurge may or may not
delete the SWE passphrase(s). To be sure the passphrase has been removed, use the SWE
passphrase delete (rmcctl -D) command.
To destroy the passphrase(s) and data on the RMC module, the rmcpurge command is used.
There are two types of overwrite, Normal (-N) and Enhanced (-E). Refer to paragraph 13.3.27
rmcpurge for additional information
1. Purge RMC module in slot 0 with normal overwrite.
Command:
rmcpurge -s 0 -N
Example
2. Purge RMC module with enhanced overwrite.
Command:
rmcpurge -s 0 -E
Example
cw_dts> rmcpurge -s 0 -N
[rmcpurge]
RMC_P0: status=OK
0[!rmcpurge] OK
cw_dts> rmcpurge -s 0 -E
[rmcpurge]
RMC_P0: status=OK
[!rmcpurge] OK