Retrieve the information about the AEADKey based on Verify bucket resource creation and follow Delete a key to delete the AEADKey, then the entire bucket would be crypto shredded.
You can run the following command to verify the bucket has been successfully crypto shredded. The BucketReady should be False and Reason to be BucketCryptoShredded.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-05 UTC."],[[["This page details how to delete Google Distributed Cloud (GDC) air-gapped storage buckets, requiring a project namespace and appropriate bucket permissions."],["Buckets with retention policies cannot be deleted until the locked date expires, but they can be crypto shredded beforehand."],["Deleting buckets via the CLI requires them to be empty; files must be removed first using the `gdcloud storage rm --recursive` command."],["Crypto shredding a bucket involves deleting its AEADKey, making the data permanently unrecoverable, and this is only available for buckets using `v1` encryption."],["Once a bucket is crypto shredded the `BucketReady` status will be `False` and `Reason` to be `BucketCryptoShredded`."]]],[]]