You can destroy data stored on disks using Storage Encryption for security reasons, including sanitizing the disks, setting the disk state to end-of-life, and emergency shredding of the data.
Sanitizing disks using Storage Encryption before return to vendor
If you want to return a disk to a vendor but do not want anyone to access sensitive data on the disk, you can sanitize it first by using the disk encrypt sanitize command. This renders the data on the disk inaccessible, but the disk can be reused. This command only works on spare disks.
What function the physical secure ID has for SEDs
Certain self-encrypting disks (SEDs) feature additional functionality to reset the disk to factory settings. These disks have a physical secure ID (PSID) printed on the disk label that is required to perform a factory reset.
SEDs that have PSID functionality
There are several models of SEDs but only some of them have PSID functionality. Earlier SED models with PSID functionality do not have the PSID printed on the disk label and therefore cannot use it.
Resetting an SED to factory original settings
If you previously set the state of an SED to end-of-life by using the disk encrypt destroy command but now want to return it to service, you can reset it to its factory original settings by using the disk encrypt revert_original command provided that the disk has a PSID printed on its label.