Jump to content

Compromise recovery

From Hackerpedia
Revision as of 00:12, 15 January 2026 by imported>Unknown user
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Languages: English | Français

Compromise recovery

The procedures and processes of restoring a system, device or process that has been compromised back to a secure or trusted state, including destroying compromised keys, replacing compromised keys (as needed), and verifying the secure state of the recovered system.


Source: NIST SP 800-152 | Category: