How does macOS meet NIST 800-88r1 'Purge' requirements on devices without EACS, specifically regarding obliteration behavior?
Hi all,
I'm working on aligning macOS device decommissioning with NIST 800-88 Revision 1 Purge requirements and need clarification on certain fallback scenarios.
On supported devices, Erase All Content and Settings (EACS) performs cryptographic erasure by securely destroying encryption keys, satisfying the Purge requirement. The uncertainty arises with devices that either don't support EACS (due to hardware or OS limitations) or where EACS can't be triggered remotely via MDM.
From Apple's limited documentation, I understand that the fallback in these cases is obliteration, but I haven't found detailed, official technical information describing exactly what obliteration does.
My specific questions are:
- Does obliteration securely destroy encryption keys, effectively achieving cryptographic erasure?
- Or is obliteration simply a wipe of the physical storage, without guaranteed destruction of key material?
- For Intel Macs with T1 (pre-2018) or T2 (2018+) chips, as well as Apple Silicon devices, all with FileVault enabled, is obliteration sufficient to meet NIST 800-88r1 Purge requirements when EACS isn't available?
The environment includes Macs from 2016 onwards, both Intel (with T1/T2 depending on the year) and Apple Silicon, all with FileVault active.
If anyone has definitive technical resources or firsthand experience with the behavior of obliteration in this context, I'd appreciate your insight.
Thanks in advance.
MacBook (2017)