The Codex · Physical Security · Protocol PSP-002
Physical documents create a persistent, tangible record of sensitive information that exists outside any digital control. They cannot be remotely wiped, access-revoked, or encrypted after the fact. A document exists from the moment it is printed or written until the moment it is verifiably destroyed — and at every point in between, it can be read by anyone who obtains it. This protocol governs that lifecycle in full.
Digital information can, in principle, be controlled through access permissions, encryption, and remote deletion. A physical document has none of these controls once it leaves the printer. It is a static, readable record that persists in whatever state it happens to be in — on a desk, in a bag, in a bin — until it is deliberately destroyed.
Most sensitive information breaches involving physical documents are not the result of targeted theft. They are the result of documents being discarded without shredding, left in spaces accessible to others, or copied more times than was necessary and tracked less carefully than the original. The vector is neglect, not adversarial effort.
The appropriate storage for a physical document is determined by what it contains and what the consequence of its exposure would be. The graduated standard is: locked container for sensitive documents in regular use; fireproof safe for documents that are irreplaceable or whose loss creates significant legal or financial consequence; safe deposit or equivalent external secure storage for documents of the highest value that are accessed rarely.
Identity documents and financial instruments sit firmly in the second category. A passport is not replaceable on short notice — it requires time, cost, and the exposure of applying for a replacement. A share certificate, a property deed, or a printed cryptographic backup is in many cases not replaceable at all. These documents warrant a fireproof safe at minimum, not a locked drawer.
Cross-cut shredding produces small rectangular fragments that can, with sufficient effort, be reconstructed. Micro-cut shredding produces fragments small enough that reconstruction is not practically achievable. The distinction matters only for documents containing information valuable enough that a motivated adversary might attempt reconstruction — financial account details, identification documents, and cryptographic material. For most routine sensitive documents, cross-cut is sufficient.
The discipline of shredding breaks down in two predictable ways: the shredder is inconveniently located, so documents accumulate in a pile to be shredded later; or the shredder is present but the habit of using it is inconsistent. Both produce the same outcome — a collection of unshredded sensitive documents in an accessible location. The countermeasure is to position the shredder adjacent to the desk and treat shredding as part of the same action as finishing with a document, not a separate task.
USB drives, external hard drives, and other physical storage media are treated in most security frameworks as digital devices with physical form — which they are — but they are also physical objects that can be lost, stolen, or accessed by anyone who picks them up. Deletion from physical media does not destroy the data; it removes the file system reference to it. Recovery of deleted files from physical media is straightforward with standard tools.
The only reliable disposal method for physical media containing sensitive data is physical destruction: shredding, degaussing, or disassembly and destruction of the storage component itself. This applies equally to old hard drives from replaced computers — a retired laptop whose hard drive has been deleted is not a secure disposal. The drive must be destroyed before the machine is discarded, donated, or repurposed.