Data and Media Sanitization
Data sanitization is the process of irreversibly removing or destroying data stored on a memory device (hard drives, flash memory / SSDs, mobile devices, CDs, DVDs, etc.) or in hard copy form. It is important to use the proper technique to ensure that all data is purged. Our guidance below is derived from NIST SP 800-88 Rev. 1 (PDF) ("Guidelines for Media Sanitization"). UTHSC also has authoritative documents about these procedures in CS-001-Device Life Cycle Security and GP-005.01-Disposal or Destruction of Electronic & Non-Electronic Media.
Although use of these tables is recommended here, other methods exist to satisfy the intent of Clear, Purge, and Destroy. Methods not specified in this table may be suitable as long as they are verified and found satisfactory by UTHSC. Not all types of available media are specified in this table. If your media are not included in this guide, organizations are urged to identify and use processes that will fulfill the intent to Clear, Purge, or Destroy their media.
Select the data or media type on the left to display the minimum sanitization requirements needed
Paper and Microforms
Clear: | N/A, see Destroy |
Purge: | N/A, see Destroy |
Destroy: |
Destroy paper using cross cut shredders which produce particles that are 1 mm x 5 mm (0.04 in. x 0.2 in.) in size (or smaller), or pulverize/disintegrate paper materials using disintegrator devices equipped with a 3/32 in. (2.4 mm) security screen. Destroy microforms (microfilm, microfiche, or other reduced image photo negatives)
by |
Notes: | When material is burned, residue must be reduced to white ash. |
Routers and Switches (home, home office, enterprise)
Clear: | Perform a full manufacturer’s reset to reset the router or switch back to its factory default settings |
Purge: | See Destroy. Most routers and switches only offer capabilities to Clear (and not Purge) the data contents. A router or switch may offer Purge capabilities, but these capabilities are specific to the hardware and firmware of the device and should be applied with caution. Refer to the device manufacturer to identify whether the device has a Purge capability that applies media-dependent techniques (such as rewriting or block erasing) to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator |
Notes: | For both Clear and (if applicable) Purge, refer to the manufacturer for additional
information on the proper Sanitization procedure. Network Devices may contain removable storage. The removable media must be removed and sanitized using media-specific techniques. |
-
By device / OS type
-
Apple iPhone and iPad (current generation and future iPhones and iPads)
-
Blackberry
-
Devices running Google's Android OS
-
Windows Phone OS 7.1/8/8.x
-
All other mobile devices
This includes cell phones, smart phones, PDAs, tablets, and other devices not covered in the preceding mobile categories.
Select the device to display the minimum sanitization requirements
Clear: | Select the full sanitize option (typically in the ‘Settings > General > Reset > Erase All Content and Settings’ menu). (The sanitization operation should take only minutes as Cryptographic Erase is supported. This assumes that encryption is on and that all data has been encrypted.) Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results. |
Purge: | Select the full sanitize option (typically in the ‘Settings > General > Reset > Erase All Content and Settings’ menu). (The sanitization operation should take only minutes with Cryptographic Erase being supported. This assumes that encryption is on and that all data has been encrypted.) |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator |
Notes: | Following the Clear/Purge operation, manually navigate to multiple areas of the device
(such as browser history, files, photos, etc.) to verify that no personal information
has been retained on the device. Before sanitizing the device, ensure that the data
is backed up to a safe place. Current iPhones have hardware encryption – turned on by default. |
Clear: | BB OS 7.x/6.x - Select Options > Security Options > Security Wipe, making sure to
select all subcategories of data types for sanitization. Then type “blackberry” in
the text field, then click on “Wipe” (“Wipe Data” in BB OS 6.x) BB OS 10.x (Decrypt media card before continuing) Select Settings, Security and Privacy, Security Wipe . Type “blackberry” in the text field, then click on “Delete Data”. The sanitization operation may take as long as several hours depending on the media size. Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results. |
Purge: | BB OS 7.x/6.x - Select Options > Security > Security Wipe, then make sure to select all subcategories of data types for sanitization. Then type “blackberry” in the text field, then click on “Wipe” (“Wipe Data” in BB OS 6.x). For BB OS 10.x Select Settings> Security and Privacy>Security Wipe. Type “blackberry” in the text field, then click on “Delete Data”. The sanitization operation may take as long as several hours depending on the media size. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | Following the Clear/Purge operation, manually navigate to multiple areas of the device (such as browser history, files, photos, etc.) to verify that no personal information has been retained on the device. Centralized management (BES) allows for device encryption. Refer to the manufacturer for additional information on the proper sanitization procedure, and for details about implementation differences between device versions and OS versions. Proper initial configuration using guides such as the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) helps ensure that the level of data protection and sanitization assurance is as robust as possible. If the device contains removable storage media, ensure that the media is sanitized using appropriate mediadependent procedures. |
Clear: | Perform a factory reset through the device’s settings menu. For example, on Samsung Galaxy S5 running Android 4.4.2, select settings, then, under User and Backup, select Backup and reset, then select Factory data reset. For other versions of Android and other mobile phone devices, refer to the user manual. Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results |
Purge: |
The capabilities of Android devices are determined by device manufacturers and service providers. As such, the level of assurance provided by the factory data reset option may depend on architectural and implementation details of a particular device. Devices seeking to use a factory data reset to purge media should use the eMMC Secure Erase or Secure Trim command, or some other equivalent method (which may depend on the device’s storage media). Some versions of Android support encryption, and may support Cryptographic Erase. Refer to the device manufacturer (or service provider, if applicable) to identify whether the device has a Purge capability that applies media-dependent sanitization techniques or Cryptographic Erase to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
Proper initial configuration using guides such as the DISA STIGs helps For both Clear and Purge, refer to the manufacturer for additional information on the proper sanitization procedure. |
Clear: | Select the Settings option (little gear symbol) from the live tile or from the app
list. On the “Settings” page, scroll to the bottom of the page and select the “About”
button. In the about page, there will be a reset your phone button at the bottom of
the page. Click on this button to continue. Choose Yes when you see the warning messages.
Please note that after the process is completed, all your personal content will disappear.
Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results |
Purge: |
The capabilities of Windows Phone devices are determined by device manufacturers and
service providers. As such, the level of assurance provided by the factory data reset
option may depend on architectural and implementation details of a particular device.
Devices seeking to use a factory data reset to purge media should use the eMMC Secure
Erase or Secure Trim command, or some other equivalent method (which may depend on In some environments, Windows Phone devices may support encryption, and may support Cryptographic Erase. Refer to the device manufacturer (or service provider, if applicable) to identify whether the device has a Purge capability that applies media-dependent sanitization techniques or Cryptographic Erase to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator |
Notes: |
Following the Clear/Purge operation, manually navigate to multiple areas of the device (such as browser history, files, photos, etc.) to verify that no personal information has been retained on the device. Before sanitizing your device, ensure that you back up your data to a safe location. Refer to the manufacturer for proper sanitization procedure, and for details about implementation differences between device versions and OS versions. Proper initial configuration using guides such as the DISA STIGs helps ensure that the level of data protection and sanitization assurance is as robust as possible. |
Clear: | Manually delete all information, then perform a full manufacturer’s reset to reset the mobile device to factory state. Sanitization performed via a remote wipe should be treated as a Clear operation, and it is not possible to verify the sanitization results. |
Purge: | See Destroy. Many mobile devices only offer capabilities to Clear (and not Purge) the data contents. A mobile device may offer Purge capabilities, but these capabilities are specific to the hardware and software of the device and should be applied with caution. The device manufacturer should be referred to in order to identify whether the device has a Purge capability that applies media-dependent techniques (such as rewriting or block erasing) or Cryptographic Erase to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator |
Notes: |
Following the Clear or (if applicable) Purge operation, manually navigate to multiple areas of the device (such as call history, browser history, files, photos, etc.) to verify that no personal information has been retained on the device. For both Clear and (if applicable) Purge, refer to the manufacturer for proper sanitization procedure. |
Office Equipment This includes copy, print, fax, and multifunction machines.
Clear: | Perform a full manufacturer’s reset to reset the office equipment to its factory default settings. |
Purge: | See Destroy. Most office equipment only offers capabilities to Clear (and not Purge) the data contents. Office equipment may offer Purge capabilities, but these capabilities are specific to the hardware and firmware of the device and should be applied with caution. Refer to the device manufacturer to identify whether the device has a Purge capability that applies media-dependent techniques (such as rewriting or block erasing) or Cryptographic Erase to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers. Office equipment may have removable storage media, and if so, media-dependent sanitization techniques may be applied to the associated storage device. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
For both Clear and (if applicable) Purge, manually navigate to multiple areas of the device (such as stored fax numbers, network configuration information, etc.) to verify that no personal information has been retained on the device. For both Clearing and (if applicable) Purge, the ink, toner, and associated supplies
(drum, fuser, etc.) should be removed and destroyed or disposed of in accordance with
applicable law, environmental, and health considerations. Some of these supplies
may retain impressions of data printed by the machine and therefore could pose a risk
of data exposure, and should be handled accordingly. If the device is functional,
one way to reduce the associated risk is to print a blank page, then an all-black
page, then another blank page. For devices with dedicated color components (such as
cyan, magenta, and yellow toners and related supplies), one page of each color should
also be printed between blank pages. The resulting sheets should be handled at For both Clear and (if applicable) Purge, refer to the manufacturer for additional
information on |
-
By media type
-
Floppies
-
Magnetic Disks (flexible or fixed)
-
Reel and Cassette Format Magnetic Tapes
-
ATA Hard Disk Drives This includes PATA, SATA, eSATA, etc.
-
SCSI Hard Disk Drives This includes Parallel SCSI,Serial Attached SCSI (SAS), Fibre Channel, USB Attached Storage (UAS), and SCSI Express Partial sanitization is not supported in this section.
Clear: | Overwrite media by using organizationally approved software and perform verification on the overwritten data. The Clear pattern should be at least a single write pass with a fixed data value, such as all zeros. Multiple write passes or more complex values may optionally be used. |
Purge: | Degauss in an organizationally approved degausser rated at a minimum for the media. |
Destroy: | Incinerate floppy disks and diskettes by burning in a licensed incinerator or Shred. |
Clear: | Overwrite media by using organizationally approved software and perform verification on the overwritten data. The Clear pattern should be at least a single write pass with a fixed data value, such as all zeros. Multiple write passes or more complex values may optionally be used. |
Purge: | Degauss in an organizationally approved degausser rated at a minimum for the media. |
Destroy: | Incinerate disks and diskettes by burning in a licensed incinerator or Shred. |
Notes: | Degaussing magnetic disks typically renders the disk permanently unusable |
Clear: | Re-record (overwrite) all data on the tape using an organizationally approved pattern, using a system with similar characteristics to the one that originally recorded the data. For example, overwrite previously recorded sensitive VHS format video signals on a comparable VHS format recorder. All portions of the magnetic tape should be overwritten one time with known nonsensitive signals. Clearing a magnetic tape by re-recording (overwriting) may be impractical for most applications since the process occupies the tape transport for excessive time periods. |
Purge: | Degauss the magnetic tape in an organizationally approved degausser rated at a minimum for the media. |
Destroy: | Incinerate by burning the tapes in a licensed incinerator or Shred. |
Notes: | Preparatory steps for Destruction, such as removing the tape from the reel or cassette
prior to Destruction, are unnecessary. However, segregation of components (tape and
reels or cassettes) may be necessary to comply with the requirements of a Destruction
facility or for recycling measures. |
Clear: | Overwrite media by using organizationally approved and validated overwriting technologies/methods/tools. The Clear pattern should be at least a single write pass with a fixed data value, such as all zeros. Multiple write passes or more complex values may optionally be used. |
Purge: |
Four options are available: a. The overwrite EXT command. Apply one write pass of a fixed pattern across the media
surface. Some examples of fixed patterns include all zeros or a pseudorandom pattern.
A single write pass should suffice to Purge the media. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | Verification must be performed for each technique within Clear and Purge, except degaussing.
The assurance provided by degaussing depends on selecting an effective degausser,
applying it appropriately and periodically spot checking the results to ensure it
is working as expected. When using the three pass ATA sanitize overwrite procedure with the invert option, the verification process would simply search for the original pattern (which would have been written again during the third pass). The storage device may support configuration capabilities that artificially restrict the ability to access portions of the media as defined in the ATA standard, such as a Host Protected Area (HPA), Device Configuration Overlay (DCO), or Accessible Max Address. Even when a dedicated sanitization command addresses these areas, their presence may affect the ability to reliably verify the effectiveness of the sanitization procedure if left in place. Any configuration options limiting the ability to access the entire addressable area of the storage media should be reset prior to applying the sanitization technique. Recovery data, such as an OEM-provided restoration image may have been stored in this manner, and sanitization may therefore impact the ability to recover the system unless reinstallation media is also available. When Cryptographic Erase is applied, verification must be performed prior to additional sanitization techniques (if applicable), such as a Clear or Purge technique applied following Cryptographic Erase, to ensure that the cryptographic operation completed successfully. A quick sampling verification as described in section 4.7 should also be performed after any additional techniques are applied following Cryptographic Erase. Not all implementations of encryption are necessarily suitable for reliance upon Cryptographic Erase as a Purge mechanism. The decision regarding whether to use Cryptographic Erase depends upon verification of attributes previously identified in this guidance. Given the variability in implementation of the ATA Security feature set SECURITY ERASE UNIT command, use of this command is not recommended without first consulting with the manufacturer to verify that the storage device’s model-specific implementation meets the needs of the organization. This guidance applies to Legacy Magnetic media only, and it is critical to verify the media type prior to sanitization. Note that emerging media types, such as HAMR media or hybrid drives may not be easily identifiable by the label. Refer to the manufacturer for details about the media type in a storage device. Degaussing the media in a storage device typically renders the device unusable |
Clear: | Overwrite media by using organizationally approved and validated overwriting technologies/methods/tools. The Clear procedure should consist of at least one pass of writes with a fixed data value, such as all zeros. Multiple passes or more complex values may optionally be used. |
Purge: | Four options are available: 1. Apply the SCSI SANITIZE command, if supported. One or both of the following options may be available: a. The OVERWRITE service action. Apply one write pass of a fixed pattern across the media surface. Some examples of fixed patterns include all zeros or a pseudorandom pattern. A single write pass should suffice to Purge the media. Optionally: Instead of one write pass, use three total write passes of a pseudorandom pattern, leveraging the invert option so that the second write pass is the inverted version of the pattern specified. b. If the device supports encryption, the CRYPTOGRAPHIC ERASE service action. Optionally: After Cryptographic Erase is successfully applied to a device, use the overwrite command (if supported) to write one pass of zeros or a pseudorandom pattern across the media. If the overwrite command is not supported, the Clear procedure could alternatively be applied. 2. Cryptographic Erase through the TCG Opal SSC or Enterprise SSC interface by issuing commands as necessary to cause all MEKs to be changed. Refer to the TCG and vendors shipping TCG Opal or Enterprise storage devices for more information. Optionally: After Cryptographic Erase is successfully applied to a device, use the overwrite command (if supported) to write one pass of zeros or a pseudorandom pattern across the media. If the overwrite command is not supported, the Clear procedure could alternatively be applied. 3. Degauss in an organizationally approved automatic degausser or disassemble the hard disk drive and Purge the enclosed platters with an organizationally approved degaussing wand. The degausser/wand should be rated sufficient for the media. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
Verification must be performed for each technique within Clear and Purge as described
in the Verify Methods subsection, except degaussing. The assurance provided by degaussing
depends on selecting an effective degausser, applying it appropriately and periodically
spot checking the results to ensure it is working as expected. Degaussing the media in a storage device typically renders the device unusable. |
External Locally Attached Hard Drives This includes, USB, Firewire, etc. (Treat eSATA as ATA Hard drive.)
Clear: | Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools. The Clear pattern should be at least a single pass with a fixed data value, such as all zeros. Multiple passes or more complex values may alternatively be used. |
Purge: |
The implementation of External Locally Attached Hard Drives varies sufficiently across models and vendors that the issuance of any specific command to the device may not reasonably and consistently assure the desired sanitization result. When the external drive bay contains an ATA or SCSI hard drive, if the commands can be delivered natively to the device, the device may be sanitized based on the associated mediaspecific guidance. However, the drive could be configured in a vendor-specific manner that precludes sanitization when removed from the enclosure. Additionally, if sanitization techniques are applied, the hard drive may not work as expected when reinstalled in the enclosure. Refer to the device manufacturer to identify whether the device has a Purge capability that applies media-dependent techniques (such as rewriting, block erasing, Cryptographic Erase, etc.) to ensure that data recovery is infeasible, and that the device does not simply remove the file pointers |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | Verification as described in the Verify Methods subsection must be performed for each
technique within Clear and Purge. Some external locally attached hard drives, especially those featuring security or encryption features, may also have hidden storage areas that might not be addressed even when the drive is removed from the enclosure. The device vendor may leverage proprietary commands to interact with the security subsystem. Please refer to the manufacturer to identify whether any reserved areas exist on the media and whether any tools are available to remove or sanitize them, if present. |
CD, DVD, BD
Clear / Purge: | N/A |
Destroy | Destroy in order of recommendations: 1. Removing the information-bearing layers of CD media using a commercial optical disk grinding device. Note that this applies only to CD and not to DVD or BD media 2. Incinerate optical disk media (reduce to ash) using a licensed facility. 3. Use optical disk media shredders or disintegrator devices to reduce to particles that have a nominal edge dimensions of 0.5 mm and surface area of 0.25 mm2 or smaller. |
-
By device type
-
ATA Solid State Drives (SSDs) This includes PATA, SATA, eSATA, etc.
-
SCSI Solid State Drives (SSSDs) This includes Parallel SCSI, Serial Attached SCSI (SAS), Fibre Channel, USB Attached Storage (UAS), and SCSI Express
-
NVM Express SSDs
-
USB Removable MediaThis includes Pen Drives, Thumb Drives, Flash Memory Drives, Memory Sticks, etc.
-
Memory CardsThis includes SD, SDHC, MMC, Compact Flash Memory, Microdrive, MemoryStick, etc.
-
Embedded Flash Memory on Boards and DevicesThis includes motherboards and peripheral cards such as network adapters or any other adapter containing non-volatile flash memory.
Clear: | 1. Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools.
The Clear procedure should consist of at least one pass of writes with a fixed data
value, such as all zeros. Multiple passes or more complex values may alternatively
be used. Note: It is important to note that overwrite on flash-based media may significantly reduce the effective lifetime of the media and it may not sanitize the data in unmapped physical media (i.e., the old data may still remain on the media). 2. Use the ATA Security feature set’s SECURITY ERASE UNIT command, if supported. |
Purge: | Three options are available: 1. Apply the ATA sanitize command, if supported. One or both of the following options may be available: a. The block erase command. Optionally: After the block erase command is successfully applied to a device, write binary 1s across the user addressable area of the storage media and then perform a second block erase. b. If the device supports encryption, the Cryptographic Erase (also known as sanitize crypto scramble) command. Optionally: After Cryptographic Erase is successfully applied to a device, use the block erase command (if supported) to block erase the media. If the block erase command is not supported, Secure Erase or the Clear procedure could alternatively be applied. 2. Cryptographic Erase through the TCG Opal SSC or Enterprise SSC interface by issuing commands as necessary to cause all MEKs to be changed. Refer to the TCG and vendors shipping TCG Opal or Enterprise storage devices for more information. Optionally: After Cryptographic Erase is successfully applied to a device, use the block erase command (if supported) to block erase the media. If the block erase command is not supported, Secure Erase or the Clear procedure could alternatively be applied. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
Verification must be performed for each technique within Clear and Purge as described
in the Verify Methods subsection. The storage device may support configuration capabilities that artificially restrict
the ability to access portions of the media as defined in the ATA standard, such as
a Host Protected Area (HPA), Device Configuration Overlay (DCO), or Accessible Max
Address. Even when a dedicated sanitization command addresses these areas, their presence
may affect the ability to reliably verify the effectiveness of the sanitization procedure
if left in place. Any configuration options limiting the ability to access the entire
addressable area of the storage media should be reset prior to applying the sanitization
technique. Recovery data, such as an OEM-provided restoration image may have been
stored in this manner, and sanitization may therefore impact the ability to recover
the system unless reinstallation media is also available. |
Clear: |
Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools. The Clear procedure should consist of at least one pass of writes with a fixed data value, such as all zeros. Multiple passes or more complex values may alternatively be used. Note: It is important to note that overwrite on flash-based media may significantly reduce the effective lifetime of the media and it may not sanitize the data in unmapped physical media (i.e., the old data may still remain on the media). |
Purge: |
Two options are available: 1. Apply the SCSI SANITIZE command, if supported. One or both of the following options may be available: a. The BLOCK ERASE service action. b. If the device supports encryption, the CRYPTOGRAPHIC ERASE service action. Optionally: After Cryptographic Erase is successfully applied to a device, use the block erase command (if supported) to block erase the media. If the block erase command is not supported, the Clear procedure could alternatively be applied. 2. Cryptographic Erase through the TCG Opal SSC or Enterprise SSC interface by issuing commands as necessary to cause all MEKs to be changed. Refer to the TCG and vendors shipping TCG Opal or Enterprise storage devices for more information. Optionally: After Cryptographic Erase is successfully applied to a device, use the block erase command (if supported) to block erase the media. If the block erase command is not supported, the Clear procedure is an acceptable alternative. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
Verification must be performed for each technique within Clear and Purge as described in the Verify Methods subsection. The storage device may support configuration capabilities that artificially restrict the ability to access portions of the media, such as SCSI mode select. Even when a dedicated sanitization command addresses these areas, their presence may affect the ability to reliably verify the effectiveness of the sanitization procedure if left in place. Any configuration options limiting the ability to access the entire addressable area of the storage media should be reset prior to applying the sanitization technique. When Cryptographic Erase is applied, verification must be performed prior to additional sanitization techniques (if applicable), such as a Clear or Purge technique applied following Cryptographic Erase, to ensure that the cryptographic operation completed successfully. A quick sampling verification as described in the Verify Methods subsection should also be performed after any additional techniques are applied following Cryptographic Erase. Not all implementations of encryption are necessarily suitable for reliance upon Cryptographic Erase as a Purge mechanism. The decision regarding whether to use Cryptographic Erase depends upon verification of attributes previously identified in this guidance and in Appendix D of NIST 800-88. Degaussing must not be performed as a sanitization technique on flash memory-based storage devices. |
Clear: | Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools. The Clear procedure should consist of at least one pass of writes with a fixed data value, such as all zeros. Multiple passes or more complex values may alternatively be used. |
Purge: |
Two options are available: 1. Apply the NVM Express Format command, if supported. One or both of the following options may be available: a. The User Data Erase command. b. If the device supports encryption, the Cryptographic Erase command. Optionally: After Cryptographic Erase is successfully applied to a device, use the User Data Erase command (if supported) to erase the media. If the User Data Erase command is not supported, the Clear procedure could alternatively be applied. 2. Cryptographic Erase through the TCG Opal SSC or Enterprise SSC interface by issuing commands as necessary to cause all MEKs to be changed. Refer to the TCG and vendors shipping TCG Opal or Enterprise storage devices for more information. Optionally: After Cryptographic Erase is successfully applied to a device, use the User Data Erase command (if supported) to erase the media. If the User Data Erase command is not supported, the Clear procedure is an acceptable alternative. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
Verification must be performed for each technique within Clear and Purge. When Cryptographic Erase is applied, verification must be performed prior to additional sanitization techniques (if applicable), such as a Clear or Purge technique applied following Cryptographic Erase, to ensure that the cryptographic operation completed successfully. A quick sampling verification as described in the Verify Methods subsection should also be performed after any additional techniques are applied following Cryptographic Erase. Not all implementations of encryption are necessarily suitable for reliance upon Cryptographic Erase as a Purge mechanism. The decision regarding whether to use Cryptographic Erase depends upon verification of attributes previously identified in this guidance. Degaussing must not be performed as a sanitization technique on flash memory-based storage devices |
Clear: | Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools. The Clear pattern should be at least two passes, to include a pattern in the first pass and its complement in the second pass. Additional passes may be used. |
Purge: | Most USB removable media does not support sanitize commands, or if supported, the interfaces are not supported in a standardized way across these devices. Refer to the manufacturer for details about the availability and functionality of any available sanitization features and commands. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | For most cases where Purging is desired, USB removable media should be Destroyed. |
Clear: | Overwrite media by using organizationally approved and tested overwriting technologies/methods/tools. The Clear pattern should be at least two passes, to include a pattern in the first pass and its complement in the second pass. Additional passes may be used. |
Purge: | N/A |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | None. |
Clear: | If supported by the device, reset the state to original factory settings. |
Purge: | N/A If the flash memory can be easily identified and removed from the board, the flash memory may be Destroyed independently from the disposal of the board that contained the flash memory. Otherwise, the whole board should be Destroyed. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: |
While Embedded flash memory has traditionally not been specifically addressed in media sanitization guidelines, the increasing complexity of systems and associated use of flash memory has complementarily increased the likelihood that sensitive data may be present. For example, remote management capabilities integrated into a modern motherboard may necessitate storing IP addresses, hostnames, usernames and passwords, certificates, or other data that may be considered sensitive. As a result, for Clearing, it may be necessary to interact with multiple interfaces to fully reset the device state. When this concept is applied to the example, this might include the BIOS/UEFI interface as well as the remote management interface. As with other types of media, the choice of sanitization technique is based on environmentspecific considerations. While the choice might be made to neither Clear nor Purge embedded flash memory, it is important to recognize and accept the potential risk and continue to reevaluate the risk as the environment changes. |
Clear/Purge: | Power off device containing DRAM, remove from the power source, and remove the battery (if battery backed). Alternatively, remove the DRAM from the device. |
Destroy: | Shred, Disintegrate, or Pulverize. |
Notes: | In either case, the DRAM must remain without power for a period of at least five minutes. |
Clear/Purge: | Perform a full chip Purge as per manufacturer’s data sheets. |
Destroy: | Shred, Disintegrate, or Pulverize. |
Notes: | None. |
Clear/Purge: | Overwrite media by using organizationally approved and validated overwriting technologies/methods/tools. |
Destroy: | Shred, Disintegrate, Pulverize, or Incinerate by burning the device in a licensed incinerator. |
Notes: | None. |
* See Flash Memory section for special requirements pertaining to solid state memory / SSD as the below guidelines do not work for SSDs.
⁺ Please note that the below guidelines rely on a crucial assumption: that the file system and hardware overwrite data in place. Although this is common and is the traditional way to do things, many modern file system designs and modern mechanical hard drives do not satisfy this assumption. Drive manufacturers have implemented performance features to make drives “smarter” and more efficient using file-caching technology. The result is that there is not always a way to ensure all bits of a file were overwritten. Modern operating systems also use features like journaling and shadow copies which can reduce the effectiveness of the below secure erase commands. Although the below commands are more secure than simply deleting a file, they do not fully adhere to the NIST 800-88 definition of “clear, purge, or destroy.” If your destruction requirements need to comply with NIST 800-88 standards, the storage media itself must be sanitized. Please see the guidelines section for that type of media.
Mac OS X |
|
Windows | |
Linux |