Data Sanitization - How Many Overwrites of a Hard Disk Are Required for Complete Data Erasure? It might be less than you imagine.
It all comes to 1's & 0's when we think about data.
Let's see how to handle our data and how to destroy it!
How Many Overwrites of a Hard Disk Are Required for Complete Data Erasure? It might be less than you imagine.
Even with the use of cutting-edge laboratory techniques, a single overwrite pass with a predetermined pattern, such as binary zeros, often makes it more difficult to recover data from storage devices with magnetic media. But it is also important to address the drive's concealed parts.
The National Institute for Standards and Technology's NIST 800-88 is well-known for its three media sanitization categories: Clear, Purge, and Destroy. Magnetic, flash-based, and other storage technologies can all be used using its principles. Additionally, it might include anything from servers and USB drives to mobile devices and even future technology.?
Decisions for information disposition and sanitization are made at various stages of the system life cycle. At the beginning of a system's development, important parameters that affect information disposition and media sanitization are chosen. Hardware and software specifications, connectivity diagrams, and data flow documentation that help the system owner identify the different media types used in the system should all be included in the initial system requirements. What alternative media will be utilized to create, capture, or transfer information used by the system should be decided during the requirements phase. In this analysis, the risk to secrecy is balanced against business demands.
The process of media sanitization and information disposal is often at its peak during the system life cycle's disposal phase. Nevertheless, many different forms of data-containing media will be transported over the course of an information system outside the organization's direct control. This action might be taken during maintenance, system upgrades, or configuration updates.
Need for Proper Media Sanitization and Information Disposition:
One important aspect of ensuring confidentiality is media sanitization. "Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information," according to the definition of confidentiality.
Organizations must properly safeguard used media in order to have appropriate controls on the information they are responsible for safeguarding. Dumpster diving for improperly disposed hard copy media, acquisition of improperly sanitized electronic media, or keyboard and laboratory reconstruction of media sanitized in a manner not commensurate with the confidentiality of its information are all common sources of illicit information collection. In and out of organizational control, media flows through paper recycle bins, out to vendors for equipment repairs, and hot swapped into other systems in response to emergencies. This potential vulnerability can be mitigated through proper understanding of where information is location, what that information is and how to protect it.
Types of Media:
There are two primary types of media in common use:
Types of Sanitizations:
The key to determining how to manage media in an organization is to consider the information first, followed by the media type. Decisions on how to deal with the media should be driven by the security categorization of the information, as well as internal environmental factors. Again, the key is to consider information confidentiality first, then media type. There is information in organizations that is not associated with any categorized system. This data is frequently found in hard copy internal communications such as memos, white papers, and presentations. This information is sometimes considered sensitive. Internal disciplinary letters, financial or salary negotiations, and strategy meeting minutes are some examples.
领英推荐
In addition to assigning a form of sanitization outlined in this article, organizations should label these media with their internal operating classifications. Each form of media requires a distinct kind of sanitization. Four categories—disposition, clearing, purging, and destruction—are used to categorize media sanitization. There are methods of disposal when media are merely thrown away without any further consideration. Some media can be merely discarded if the exposure of material would not affect the corporate mission, would not cause harm to organizational assets, would not cause financial loss, and would not cause harm to any individuals. Disposal is brought up to reassure companies that not all media needs to be sanitized and that handling media containing non-confidential information may still be done via disposal. Since disposal is not technically a type of sanitization, it will not be mentioned or addressed outside of this section.
Let us see...
a. Disintegration, Incineration, Pulverization, and Melting. These sanitization methods are designed to completely destroy the media. They are typically carried out at an outsourced metal destruction or incineration facility with the specific capabilities to perform these activities effectively, securely, and safely.
b. Shredding. Paper shredders can be used to destroy flexible media such as diskettes once the media are physically removed from their outer containers. The shred size of the refuse should be small enough that there is reasonable assurance in proportion to the data confidentiality level that the information cannot be reconstructed. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks (DVD), and magneto-optic (MO) disks must be destroyed by pulverizing, crosscut shredding or burning. Destruction of media should be conducted only by trained and authorized personnel. Safety, hazmat, and special disposition needs should be identified and addressed prior to conducting any media destruction.
Identification of the Need for Sanitization:
Choosing whether and when to sanitize media is one of the initial steps in making a sanitization choice. Media containing representations of the data stored in the system are produced at every stage of the system's life cycle. These media can be simple data prints, screenshots, or cached memories of user actions, among other formats. In order to keep adequate control over the information, organizations must be aware of which media are being used to capture data and when. Organizations will be able to tell when adequate media disposal sanitization is required thanks to this understanding. These decisions on proper disposal can be as simple as ensuring placement of paper shredders in work areas during system steady-state activities or address destroying electronic equipment at the end of its life cycle.
Documentation:
An organization must keep a record of its sanitization in order to show what media were sanitized, when, how they were cleaned, and how the media were eventually disposed of. It is frequently due to poor record keeping and media sanitization that an organization is thought to have lost control of its information. In order to maintain effective accountability of equipment and inventory control, organizations should make sure that property management representatives are included in the documentation of the media sanitization process. Organizations should carry out prudent documentation procedures for media carrying information of low security category.
All in all, by focusing on erasing and reusing assets instead of physically destroying them, organizations can improve their security posture and address corporate social responsibility requirements, while also ensuring compliance with local and global data privacy requirements.
Thanks for reading.
Odzyskiwanie danych, naprawy laptopów i innego sprz?tu komputerowego, szkolenia z odzyskiwania danych.
1 年Can the type of data affect the effectiveness of the sanitization process in any way? What requirements influence data overwrite recommendations? In particular, how does media size affect overwrite effectiveness? What non-standard attack methods do you know that could lead to the recovery of overwritten data? How is Secure Erase different from overwriting? What significant impact do these differences have when overwrite is classified as "Clear" and Secure Erase as "Purge"? Can you explain why NIST classifies degaussing as "Purge" and not as "Destroy"? Do the sanitization methods described in NIST differ in effectiveness? Would you agree with me that if a method does not guarantee 100% data destruction and 100% resistance to any attack, we cannot consider it effective? What is the point of using ineffective data destruction methods? What's the point of using more than one effective data destruction method?
Chief Information Security Officer @ EQS Group | PhD, MBA, CISSP, CISA, CISM, CDPSE, CRISC, GCIH, C|CISO, ISO/IEC 27001 LA
2 年Interesting, too bad the article misses cryptographic erasure - which is what should be used anyway 99% of the time since every decent modern data center drive and storage supports AES in hardware or software, which should be used anyway to avoid threats from physical access to the media and its hosting. Cryptographic erasure is also much more reliable than the old sanitization methods, but it is important to indicate the Revision 1 version of NIST 800-88 ( https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf ) which includes it.
SOC Security Analyst | CompTIA Security+ | IBM Qradar | Splunk Enterprise Security | CrowdStrike Falcon | SentinelOne | Proofpoint
2 年The gist of this article is "Four categories—disposition, clearing, purging, and destruction—are used to categorize media sanitization."?