Destroying the Security Key Use the command in the following table to destroy the security key. Table 13. Destroy the Security Key Convention MegaCli -DestroySecurityKey | [-Force] -aN Description Destroys the security key. The controller uses the security key to lock and unlock access to the secure user data. Re-provisioning disables the security system of a device. For a controller, it involves destroying the security key. For SED drives, when the drive lock key is deleted, the drive is unlocked and any user data on the drive is securely deleted.
Destroying the Security Key
Use the command in the following table to destroy the security key.
Table 13. Destroy the Security Key
Convention
MegaCli -DestroySecurityKey | [-Force] -aN
Description
Destroys the security key. The controller uses the security key to lock and unlock access to the secure user data.
Re-provisioning disables the security system of a device. For a controller, it involves destroying the security key. For SED drives, when the drive lock key is deleted, the drive is unlocked and any user data on the drive is securely deleted.