The guide, however, does say that "instructions on clearing, sanitization and release of IS media shall be issued...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
by the accrediting CSA." Standards for sanitization are left up to the Cognizant Security Agency, which can be the Department of Defense (DoD), the Department of Energy (DOE), the Natural Resources Commission (NRC) and the Central Intelligence Agency (CIA).
The DOE, for one, has issued Media Clearing, Purging and Destruction Guidance as part of the Cyber Security Program. A more practical document is the DoD's Clearing and Sanitization Matrix from the Defense Security Service.This guide, in particular, does specify methods and procedures for destroying classified media and equipment. I would also recommend the NIST Special Publication 800-88, Guidelines for Media Sanitization. Its recommendations can be applied to all types of organizations and will help you devise an appropriate erasure policy based on the level of your information's confidentiality.
So what level of erasure should you set for your confidential data? When vendors state that their products meet the "DoD 5220.22-M standard," it generally means that the tool will write to all addressable hard drive locations with a character, its complement, then a random character, followed by verification. The procedure is completed three times and prevents data from being recovered by commercially available processes.
Interestingly in the fall of 2004, the U.S. National Security Agency (NSA Advisory LAA-006-2004) found that a single overwrite using the above process is sufficient to render electronic files unrecoverable. One problem with software disk-wiping is that it cannot sanitize disconnected or forgotten internal hard drives, or hard drives that have actually physically failed.
Therefore if your drives are not required again, you could look at destroying them by degaussing, melting, incineration, crushing or shredding. Physical destruction offers the highest level of erasure, but even this tactic is not necessary absolute, especially if any remaining disk pieces are larger than a single 512-byte record block.
Whichever method you chose, either software wiping or physical destruction, you must put policies in place that govern hard drive disposal. Also, employee training should ensure that you have taken "reasonable measures" to safeguard your data. The FTC's Fair and Accurate Credit Transactions Act (FACTA) rule governs the proper storage and disposal of certain consumer information and requires that such information is properly disposed of. Although physically destroying disks is more costly than wiping them, the potential costs associated with compromised data may make it the best option.
Dig Deeper on Enterprise Data Governance
Related Q&A from Michael Cobb
Is cookie encryption enough to protect sensitive information? Expert Michael Cobb explains how salted hashes can prevent attacks, and the secure way ...continue reading
A vulnerability was found in the Blackphone's Icera modem. Expert Michael Cobb explains how attackers could hijack the device, and if this would ...continue reading
Oracle is killing off the Java browser plug-in due to security risks. Expert Michael Cobb explains the next steps for enterprises with Java-based ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.