Described under NIST 800-88 as “Clearing,” this technique goes beyond simple data sanitization to provide a level of media sanitization that protects the confidentiality of information against robust keyboard attacks from standard input devices and from data scavenging tools. Clearing must also prevent information from being retrieved by data, disk, or file recovery utilities.
An acceptable clearing method is overwriting, which is typically accomplished using data wiping software. In a standard implementation, the overwriting utility writes the same information (e.g., ones and zeros, or a specific set of characters) throughout the storage medium.
Another technique prescribed under NIST 800-88, purging protects the confidentiality of information against laboratory attacks involving advanced non-standard data recovery techniques on storage media outside of their normal operating environment. Such attacks typically enlist the services of specially trained personnel using signal processing equipment.
For Advanced Technology Attachment (ATA) disk drives with a capacity of over 15 GB and manufactured after 2001, the official distinction between clearing and purging has become blurred. Under the NIST guidelines, an acceptable purging technique for these drives is to execute the firmware Secure Erase command, then perform a degaussing operation as described below.
This is an electromagnetic sanitization process performed by sanitization tools called degaussers that incorporate powerful magnets to sanitize a USB flash drive (hard drive sanitization). The application of an electromagnetic field by this device effectively destroys the magnetic field of a disk or drive, rendering it unusable. With some devices, it may be possible for the manufacturer to reformat the drive, so to dispose of hard drives securely, this method is often used prior to physical destruction.
Strong encryption algorithms are routinely employed to prevent unauthorized access to data during the service life of IT equipment. However, this technique can also make it impossible to gain access to data on a storage device when it’s retired. The trick is to use a robust encryption algorithm on the data, then destroy the encryption key, effectively rendering the information on the drive unrecoverable.
For all applications, actual physical destruction of storage media is the safest and most secure method of media sanitization. However, choosing the best way to destroy a hard drive or other storage medium depends on the device’s nature and the information resident on it.
Standard physical destruction techniques include breaking the storage media into unusable shards through grinding or the use of an HDD shredder machine, melting or incinerating the media using a licensed incinerator, vaporizing or pulverizing hard drive using a combination of heat, pressure, and chemicals, degrading storage materials by applying corrosive acids, or applying extremely high voltages to the media.