SlideShare a Scribd company logo
8
Most read
10
Most read
Data Sanitization and
Disposal: Best Practices
Ed Pletner - CEO
Christian Lardie - IT Project Coordinator
Laws, Regulations, & Liabilities
●FACTA: Fair and Accurate Credit Transactions Act
●“any person who maintains or otherwise possesses
consumer information for a business purpose” must
properly destroy discarded information.
●“must properly dispose of such information by taking
reasonable measures to protect against unauthorized
access to or use of the information in connection with its
disposal.
●Civil Liability, Class Action, Federal Enforcement, State
Enforcement
●Others: HIPAA, HITECH, PCI DSS, Sarbanes-Oxley,
Graham-Leech-Bliley, etc.
Techniques for Data Destruction
• Shredding: Industrial Hard Drive
Shredding Machine (ex Ameri-shred)
• Degaussing: Magnetic data on a tape or
hard disk is neutralized or erased. Makes
media unusable and damages the
storage system
Techniques for Data Destruction
• Wiping: Overwriting of data with 1s and 0s or non-
sensitive data
• Free Wiping Software: Ex. Dban, ActiveKillDisk
• Advantage: Free and easy to use
• Disadvantage: No validation of wipe
• Paid Wiping Software: Ex. Tabernus, WipeDrive
• Advantages: Error handling of failed drives,
Reporting/Logging of successful data erasure
• Disadvantage: Costs
Myths of Data Destruction
• A simple re-format/delete is adequate
• SSDs should be treated the same as Hard
Drives
• Hammer to hard drive
NIST Media Sanitization Guidelines
• NIST (National Institute of Standards and
Technology)
• Updated from older 3-Pass (DOD 5220.22-M)
• For ATA disk drives manufactured after 2001
(over 15 GB) clearing by overwriting the media
once is adequate to protect the media from
both keyboard and laboratory attack.
NIST Sanitization Methods
●Clear applies logical techniques to sanitize data in all user-addressable
storage locations for protection against simple non-invasive data recovery
techniques; typically applied through the standard Read and Write
commands to the storage device
●Ex. Software Wipe (1 or more Pass)
●Purge applies physical or logical techniques that render Target Data
recovery infeasible using state of the art laboratory techniques.
●Ex. ATA SecureErase; Cryptographic Erase, Degauss
●Destroy renders Target Data recovery infeasible using state of the art
laboratory techniques and results in the subsequent inability to use the
media for storage of data
●Ex. Shred, Incinerate, Pulverize
Data Sanitization and Disposal: Best Practices
1. Manufacturer
2. Model
3. Serial Number
4. Media Type
5. Sanitization Description
(Clear, Purge, Destroy)
6. Method Used (degauss,
overwrite, block erase,
crypto erase, shred)
7. Verification Method
8. Signed & Dated
Documentation
CERTIFICATE OF DESTRUCTION
THIS IS TO CERTIFY THAT ALL MATERIALS RECEIVED FROM THE BELOW LISTED CUSTOMER FOR
DESTRUCTION WERE DESTROYED AND WILL BE RECYCLED IN ACCORDANCE WITH ALL
APPLICABLE FEDERAL, STATE, AND LOCAL REGULATIONS. WE FURTHER WARRANT THAT
REASONABLE PRECAUTIONS WERE TAKEN TO PREVENT ANY UNAUTHORIZED THIRD PARTY FROM
GAINING ACCESS TO THE MATERIALS WHILE IN OUR POSSESSION TO FINAL DISPOSITION
Customer Location:
ABC Company
123 Street Dr.
San Diego, CA 92111
650 Gateway Center Way, Suite I
San Diego, CA 92102
858-715-0950
www.avritek.com
________________________
Destruction Certified By Date
Generator Location:
ABC Company
123 Street Dr.
San Diego, CA 92111
Material Description(s): 100 Hard Drives Shredded/Wiped (see attached excel sheet for
Serials).
REFERENCE #:
PT-1244
Mobile Device Security
●Factory Reset
●Blackberry: Security Wipe
●Android: Encrypt then factory reset
●Apple (iPad & iPhone): Enable Data Protection then
“Erase All Content”
●Software Wipe via Tabernus or WipeDrive Mobile
●Reporting
●Utilizes the factory reset partition
●Shred

More Related Content

PDF
Database forensics
PPTX
Digital forensic tools
PDF
Data Loss Prevention: Challenges, Impacts & Effective Strategies
PDF
Digital Forensics
PPT
Data recovery
PPTX
Computer forensic ppt
PPT
Data loss prevention (dlp)
PPTX
Incident response
Database forensics
Digital forensic tools
Data Loss Prevention: Challenges, Impacts & Effective Strategies
Digital Forensics
Data recovery
Computer forensic ppt
Data loss prevention (dlp)
Incident response

What's hot (20)

PPTX
Introduction to filesystems and computer forensics
PDF
Accessing Forensic Images
PPTX
Digital forensics
PPT
Introduction to computer forensic
PPT
Computer +forensics
PPTX
mobile forensic.pptx
PPTX
Data Acquisition
PPTX
Computer forensics powerpoint presentation
PDF
NTXISSACSC4 - Layered Security / Defense in Depth
PPT
Data recovery
PPT
Digital Forensics
PPTX
Network forensic
PPTX
Security Awareness & Training
PDF
14 tips to increase cybersecurity awareness
PPTX
Data security
PPTX
Information Security Awareness Training Open
PPTX
Mobile Forensics
PDF
Digital Forensic: Brief Intro & Research Challenge
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
Introduction to filesystems and computer forensics
Accessing Forensic Images
Digital forensics
Introduction to computer forensic
Computer +forensics
mobile forensic.pptx
Data Acquisition
Computer forensics powerpoint presentation
NTXISSACSC4 - Layered Security / Defense in Depth
Data recovery
Digital Forensics
Network forensic
Security Awareness & Training
14 tips to increase cybersecurity awareness
Data security
Information Security Awareness Training Open
Mobile Forensics
Digital Forensic: Brief Intro & Research Challenge
Data Privacy: What you need to know about privacy, from compliance to ethics
Ad

Similar to Data Sanitization and Disposal: Best Practices (20)

PPT
An Introduction to Asset Recovery
PDF
Rothke effective data destruction practices
PDF
Ben Rothke - Effective Data Destruction Practices
PDF
Data Sanitization: What, Why, When and How?
PPTX
A guide to Sustainable Cyber Security
PPTX
Data security
PPTX
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
PPTX
Anti forensic
PPT
computer forensics
PDF
Ce hv6 module 55 preventing data loss
PPTX
Data destruction policy
PDF
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
PPTX
DG_Architecture_Training.pptx
PPTX
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
PPT
Spotlight on GFI EndPoint Security 2013
PPT
cyber forensics - TYPES OF CYBER FORENSICS.ppt
PDF
Effective Data Erasure and Anti Forensics Techniques
PPTX
Data Security Management - Data Analytics
PPTX
GDPR Part 2: Quest Relevance
PPTX
An Introduction to Asset Recovery
Rothke effective data destruction practices
Ben Rothke - Effective Data Destruction Practices
Data Sanitization: What, Why, When and How?
A guide to Sustainable Cyber Security
Data security
PACE-IT, Security+ 4.4: Controls to Ensure Data Security
Anti forensic
computer forensics
Ce hv6 module 55 preventing data loss
Data destruction policy
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
DG_Architecture_Training.pptx
digitalforensicpptlatest28-230522192202-1d9b832e (1).pptx
Spotlight on GFI EndPoint Security 2013
cyber forensics - TYPES OF CYBER FORENSICS.ppt
Effective Data Erasure and Anti Forensics Techniques
Data Security Management - Data Analytics
GDPR Part 2: Quest Relevance
Ad

Recently uploaded (20)

PPTX
Wireless and Mobile Backhaul Market.pptx
PPTX
Embeded System for Artificial intelligence 2.pptx
PPT
Lines and angles cbse class 9 math chemistry
PPTX
Operating System Processes_Scheduler OSS
PPTX
Nanokeyer nano keyekr kano ketkker nano keyer
DOCX
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
PDF
Smarter Security: How Door Access Control Works with Alarms & CCTV
PPTX
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PDF
PPT Determiners.pdf.......................
PPTX
Embedded for Artificial Intelligence 1.pptx
PDF
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
DOCX
Edukasi kultural untuk kita semua maka c
PPTX
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPTX
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
PPTX
material for studying about lift elevators escalation
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
A Clear View_ Interpreting Scope Numbers and Features
PDF
Dozuki_Solution-hardware minimalization.
Wireless and Mobile Backhaul Market.pptx
Embeded System for Artificial intelligence 2.pptx
Lines and angles cbse class 9 math chemistry
Operating System Processes_Scheduler OSS
Nanokeyer nano keyekr kano ketkker nano keyer
fsdffdghjjgfxfdghjvhjvgfdfcbchghgghgcbjghf
Smarter Security: How Door Access Control Works with Alarms & CCTV
Presentation 1.pptxnshshdhhdhdhdhdhhdhdhdhd
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPT Determiners.pdf.......................
Embedded for Artificial Intelligence 1.pptx
Presented by ATHUL KRISHNA.S_20250813_191657_0000.pdf
Edukasi kultural untuk kita semua maka c
02fdgfhfhfhghghhhhhhhhhhhhhhhhhhhhh.pptx
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Entre CHtzyshshshshshshshzhhzzhhz 4MSt.pptx
material for studying about lift elevators escalation
Fundamentals of Computer.pptx Computer BSC
A Clear View_ Interpreting Scope Numbers and Features
Dozuki_Solution-hardware minimalization.

Data Sanitization and Disposal: Best Practices

  • 1. Data Sanitization and Disposal: Best Practices Ed Pletner - CEO Christian Lardie - IT Project Coordinator
  • 2. Laws, Regulations, & Liabilities ●FACTA: Fair and Accurate Credit Transactions Act ●“any person who maintains or otherwise possesses consumer information for a business purpose” must properly destroy discarded information. ●“must properly dispose of such information by taking reasonable measures to protect against unauthorized access to or use of the information in connection with its disposal. ●Civil Liability, Class Action, Federal Enforcement, State Enforcement ●Others: HIPAA, HITECH, PCI DSS, Sarbanes-Oxley, Graham-Leech-Bliley, etc.
  • 3. Techniques for Data Destruction • Shredding: Industrial Hard Drive Shredding Machine (ex Ameri-shred) • Degaussing: Magnetic data on a tape or hard disk is neutralized or erased. Makes media unusable and damages the storage system
  • 4. Techniques for Data Destruction • Wiping: Overwriting of data with 1s and 0s or non- sensitive data • Free Wiping Software: Ex. Dban, ActiveKillDisk • Advantage: Free and easy to use • Disadvantage: No validation of wipe • Paid Wiping Software: Ex. Tabernus, WipeDrive • Advantages: Error handling of failed drives, Reporting/Logging of successful data erasure • Disadvantage: Costs
  • 5. Myths of Data Destruction • A simple re-format/delete is adequate • SSDs should be treated the same as Hard Drives • Hammer to hard drive
  • 6. NIST Media Sanitization Guidelines • NIST (National Institute of Standards and Technology) • Updated from older 3-Pass (DOD 5220.22-M) • For ATA disk drives manufactured after 2001 (over 15 GB) clearing by overwriting the media once is adequate to protect the media from both keyboard and laboratory attack.
  • 7. NIST Sanitization Methods ●Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection against simple non-invasive data recovery techniques; typically applied through the standard Read and Write commands to the storage device ●Ex. Software Wipe (1 or more Pass) ●Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the art laboratory techniques. ●Ex. ATA SecureErase; Cryptographic Erase, Degauss ●Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in the subsequent inability to use the media for storage of data ●Ex. Shred, Incinerate, Pulverize
  • 9. 1. Manufacturer 2. Model 3. Serial Number 4. Media Type 5. Sanitization Description (Clear, Purge, Destroy) 6. Method Used (degauss, overwrite, block erase, crypto erase, shred) 7. Verification Method 8. Signed & Dated Documentation
  • 10. CERTIFICATE OF DESTRUCTION THIS IS TO CERTIFY THAT ALL MATERIALS RECEIVED FROM THE BELOW LISTED CUSTOMER FOR DESTRUCTION WERE DESTROYED AND WILL BE RECYCLED IN ACCORDANCE WITH ALL APPLICABLE FEDERAL, STATE, AND LOCAL REGULATIONS. WE FURTHER WARRANT THAT REASONABLE PRECAUTIONS WERE TAKEN TO PREVENT ANY UNAUTHORIZED THIRD PARTY FROM GAINING ACCESS TO THE MATERIALS WHILE IN OUR POSSESSION TO FINAL DISPOSITION Customer Location: ABC Company 123 Street Dr. San Diego, CA 92111 650 Gateway Center Way, Suite I San Diego, CA 92102 858-715-0950 www.avritek.com ________________________ Destruction Certified By Date Generator Location: ABC Company 123 Street Dr. San Diego, CA 92111 Material Description(s): 100 Hard Drives Shredded/Wiped (see attached excel sheet for Serials). REFERENCE #: PT-1244
  • 11. Mobile Device Security ●Factory Reset ●Blackberry: Security Wipe ●Android: Encrypt then factory reset ●Apple (iPad & iPhone): Enable Data Protection then “Erase All Content” ●Software Wipe via Tabernus or WipeDrive Mobile ●Reporting ●Utilizes the factory reset partition ●Shred