Diagram showing four phases: Pre-Operational, Operational, Post-Operational, Destroyed. Within the Pre-Operational, there is a Pre-activation state showing that once a key is created it replicates and is ready to be assigned. Once assigned the key is in an the active state. Within the Operational phase, there is an active state showing the key protected and processed. Once the encryption key expires it remains active but is only used to process data. Once the cryptoperiod expires it becomes deactivated and moves to the Post-Operational phase. The key is then moves to the Destroyed phase. Destruction is only complete if backups using the key are deleted.