MP-6(8)—Remote Purging Or Wiping Of Information
>Control Description
Provide the capability to purge or wipe information from ⚙organization-defined systems or system components ☑remotely; under the following conditions: [Assignment: organization-defined conditions].
>Cross-Framework Mappings
>Supplemental Guidance
Remote purging or wiping of information protects information on organizational systems and system components if systems or components are obtained by unauthorized individuals. Remote purge or wipe commands require strong authentication to help mitigate the risk of unauthorized individuals purging or wiping the system, component, or device. The purge or wipe function can be implemented in a variety of ways, including by overwriting data or information multiple times or by destroying the key necessary to decrypt encrypted data.
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What formal policies and procedures govern the implementation of MP-6(8) (Remote Purging Or Wiping Of Information)?
- •Who are the designated roles responsible for implementing, maintaining, and monitoring MP-6(8)?
- •How frequently is the MP-6(8) policy reviewed and updated, and what triggers policy changes?
- •What governance structure ensures MP-6(8) requirements are consistently applied across all systems?
Technical Implementation:
- •Describe the specific technical mechanisms or controls used to enforce MP-6(8) requirements.
- •What automated tools, systems, or technologies are deployed to implement MP-6(8)?
- •How is MP-6(8) integrated into your system architecture and overall security posture?
- •What configuration settings, parameters, or technical specifications enforce MP-6(8) requirements?
Evidence & Documentation:
- •What documentation demonstrates the complete implementation of MP-6(8)?
- •What audit logs, records, reports, or monitoring data validate MP-6(8) compliance?
- •Can you provide evidence of periodic reviews, assessments, or testing of MP-6(8) effectiveness?
- •What artifacts would you present during a FedRAMP assessment to demonstrate MP-6(8) compliance?
Ask AI
Configure your API key to use AI features.