Media Clearing and Sanitization (CSG-08\G)

UNCLASSIFIED
COTS SECURITY GUIDANCE
(CSG)
MEDIA CLEARING AND
SANITIZATION
CSG-08\G
August 2009
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
This page intentionally left blank.
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Foreword
The Media Clearing and Sanitization (CSG-08\G) is an unclassified publication, issued
under the authority of the Chief, Communications Security Establishment Canada (CSEC).
Suggestions for amendments should be forwarded through departmental communications
security channels to your Client Services Representative at CSEC.
For further information, please contact CSEC’s ITS Client Services area by e-mail at
[email protected] or call (613) 991-7654.
Effective Date
This publication takes effect on 08/28/2009.
Carey Frey
Director, IT Security Industry Program
© Government of Canada, Communications Security Establishment Canada 2009
It is not permissible to make copies or extracts from this publication without the written consent of CSEC.
2009
i
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
This page intentionally left blank.
ii
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Table of Contents
Foreword......................................................................................................................... i
Effective Date ................................................................................................................. i
Table of Contents ......................................................................................................... iii
List of Tables ................................................................................................................. v
1
Introduction ........................................................................................................... 1
1.1
Degrees of Media Sanitization...................................................................... 1
1.1.1 Clearing ............................................................................................. 1
1.1.2 Sanitization ........................................................................................ 1
1.2
Non-Electronic Data Storage........................................................................ 1
2
Overview ................................................................................................................ 3
2.1
Media Types................................................................................................. 3
2.1.1 Non-electronic media ......................................................................... 3
2.1.2 Magnetic media ................................................................................. 3
2.1.3 Optical media..................................................................................... 4
2.1.4 Semi-conductor storage devices........................................................ 4
2.2
Media Clearing and Sanitization Methods .................................................... 5
2.2.1 Overwriting......................................................................................... 5
2.2.2 Secure Erase (ANSI) ......................................................................... 6
2.2.3 Encryption.......................................................................................... 6
2.2.4 Degaussing........................................................................................ 7
2.2.5 Physical Deformation ......................................................................... 7
2.2.6 Shredding and Disintegration............................................................. 7
2.2.7 Material Separation/Fractionation Recycling Technology .................. 8
2.2.8 Grinding, Hole Punching, and Hammer-milling .................................. 8
2.2.9 Incineration ........................................................................................ 8
2.2.10 Knurling.............................................................................................. 9
3
Security Issues ...................................................................................................... 9
3.1
Overwriting ................................................................................................... 9
3.1.1 Magnetic Media ................................................................................. 9
3.1.2 Solid State Media............................................................................. 11
3.2
Secure Erase (ANSI) .................................................................................. 12
3.2.1 Applicable Media ............................................................................. 12
3.2.2 Secure Erase Implementations........................................................ 12
3.3
Encryption .................................................................................................. 12
3.3.1 Applicable Media ............................................................................. 12
3.3.2 Authentication .................................................................................. 12
3.3.3 Storage and destruction of decryption keys ..................................... 13
3.4
Degaussing ................................................................................................ 13
2009
iii
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
3.5
3.6
3.7
3.8
3.9
3.10
4
iv
3.4.1 Applicable Media ............................................................................. 13
3.4.2 Magnetic coercivity and Magnetic Orientation ................................. 13
3.4.3 Re-use after degaussing.................................................................. 14
3.4.4 Maintenance and operation ............................................................. 14
Physical Deformation.................................................................................. 15
3.5.1 Applicable Media ............................................................................. 15
3.5.2 Acceptable Physical Deformation Techniques................................. 15
Shredding and Disintegration ..................................................................... 15
3.6.1 Applicable Media ............................................................................. 15
Material separation/fractionation recycling technology ............................... 16
Grinding, Hammer-milling and Pulverization .............................................. 16
3.8.1 Applicable Media ............................................................................. 16
3.8.2 Pulverization .................................................................................... 16
Incineration................................................................................................. 16
3.9.1 Applicable Media ............................................................................. 16
3.9.2 Melting or Combustion Point............................................................ 17
3.9.3 Particle Filter.................................................................................... 17
Knurling ...................................................................................................... 17
Glossary and Acronyms ..................................................................................... 17
4.1
Glossary ..................................................................................................... 17
4.2
Acronyms ................................................................................................... 18
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
List of Tables
Table 1: Security Features Checklist: Media Clearing and Sanitization ........................ 20
2009
v
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
This page intentionally left blank.
vi
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
1
Introduction
This document addresses Media Clearing and Sanitization products.
1.1
Degrees of Media Sanitization
There are two degrees of media sanitization, clearing and sanitization.
1.1.1 Clearing
Clearing refers to the erasure of sensitive data so that the media can be re-used within the same
department at the same level of sensitivity.
Clearing does not downgrade the sensitivity of the media; it only provides assurance that the
“need to know” principle will not be violated.
1.1.2 Sanitization
Sanitization refers to the destruction of data on a storage medium in a manner that precludes any
reasonable hope of recovery1 of the data. It includes processes for the physical destruction of the
media, as well as non-destructive processes which allow the media to be re-used in a different
department or at a lower level of classification. Sanitization is concerned with preserving the
confidentiality of the data.
1.2
Non-Electronic Data Storage
This document does not directly address the destruction of non-electronic data storage, such as
paper hard copy, microfiche/microfilm, or photographs. However, many characteristics/desired
features of the physical destruction methods addressed in this document are applicable to the
destruction of such non-electronic storage media as well.
1 Reasonable hope: if a threat agent with opportunity, motivation and capability believes the presumed
value of the data is worth the time and cost to attempt to recover it. CSEC ITSG-06
2009
1
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
This guidance is for generic media clearing and sanitization techniques and products. Some of
these techniques are not suitable for the sanitization of classified material; other techniques may
be used to sanitize classified material only in combination with other techniques. In particular,
media containing Secret or Top Secret material may require two separate sanitization processes –
e.g. triple overwrite followed by disintegration or shredding, encryption followed by
incineration, or equivalent as specified by ITSG-06: Clearing and Declassifying Electronic Data
Storage Devices.
This guidance does not apply to controlled cryptographic items (CCI). CCI are subject to
separate destruction and disposal instructions issued by CSEC to departmental COMSEC
authorities.
For more detail on sanitization requirements, and particularly for disposal of classified material,
the reader is referred to ITSG-06, available at
http://www.cse-cst.gc.ca/documents/publications/itsg-csti/itsg06-eng.pdf
2
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
2
Overview
2.1
Media Types
2.1.1 Non-electronic media
Sanitization of hard copy non-electronic media, such as paper, film, or microforms, is out of
scope for this publication.
However, as these media are normally destroyed by shredding, disintegration, or incineration,
the principles for shredding, disintegration, and incineration devices, as described elsewhere in
this annex, can be assumed to apply to non-electronic media as well.
2.1.2 Magnetic media
Magnetic media is media, such as magnetic tapes or disks, capable of storing information in the
form of electromagnetic signals.
2.1.2.1
Magnetic tape
Magnetic tape is a medium for magnetic recording, generally consisting of a thin magnetizable
coating on a long, narrow strip of plastic. Nearly all recording tape is of this type, whether used
for recording audio or video or for computer data storage.
2.1.2.2
Floppy disk
A floppy disk is a data storage medium composed of a thin, flexible disk of magnetic storage
material, encased in a square or rectangular plastic shell. Floppy disks come in sizes of 8", 5.25",
and 3.5" formats. They are read and written by a floppy disk drive of the appropriate size.
2.1.2.3
Magnetic stripe
A magnetic stripe, often shortened to “magstripe”, is a band of magnetic material, usually
mounted on a plastic card. The stripe is read by physical contact and swiping past a reading
head.
Magnetic stripes are commonly used in credit cards, identity cards, and transportation tickets.
2.1.2.4
Hard drives
A hard drive, also commonly referred to as a hard disk drive (HDD), hard disk or fixed disk
drive, is a non-volatile storage device which stores digitally encoded data on rapidly rotating
platters with magnetic surfaces.
2009
3
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
2.1.2.5
Magnetic Core Memory
Magnetic core memory, also referred to as ferrite-core memory or core memory, is an early form
of random access computer memory. It uses small magnetic ceramic rings to store information
via the polarity of their magnetic field.
2.1.2.6
Magnetic Bubble Memory
Bubble memory is a type of non-volatile computer memory that uses a thin film of a magnetic
material to hold small magnetized areas, known as bubbles, which each store one bit of data.
2.1.3 Optical media
Optical media uses polycarbonate material to store digital information. The data is accessed and
read using laser diode technology. Optical media generally comes in three forms - Read Only
Memory (ROM), Write Once Read Many (WORM), and Rewriteable (RW).
2.1.3.1
Compact Disk
A Compact Disc (CD) is an optical disc, originally developed to store digital audio, but
subsequently adapted to store digital data. Standard CDs have a diameter of 120 mm, but smaller
disks of 80 mm diameter are also available.
The original audio technology was later adapted and expanded. In addition to audio CD and CD–
Read-Only Memory (CD-ROM), the most common forms are CD-Rewritable (CD-RW) and CDRecordable (CD-R).
2.1.3.2
Digital Video Disk
Digital Video Disk (DVD) is an optical disc storage media format, typically of the same size and
shape as a CD but with much higher storage capacity. Its main uses are video and data storage.
DVD-Read-Only Memory (DVD-ROM) stores data which can only be read and not written;
DVD-Recordable (DVD-R) and DVD Plus Recordable (DVD+R) are competing WORM
standards; DVD-Random Access Memory (DVD-RAM), DVD-Rewritable (DVD-RW), or DVD
Plus Rewritable (DVD+RW) disks can be re-written multiple times.
2.1.4 Semi-conductor storage devices
2.1.4.1
Programmable Read-Only Memory
Programmable Read-Only Memory (PROM) is a form of digital memory where the setting of
each bit is locked by a fuse (an electrical component that is designed to permanently break an
electrically conductive path when the current through the path exceeds a specified limit) or
antifuse (an electrical device that starts with a high resistance and is designed to permanently
create an electrically conductive path when the voltage across the antifuse exceeds a certain
level).
4
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
The key difference between ROM and PROM is that with PROM, the programming is applied
after the device is constructed. Once the PROM has been programmed, it can no longer be
written to.
2.1.4.2
Erasable Programmable Read-Only Memory
Erasable Programmable Read-Only Memory (EPROM) is a type of non-volatile computer
memory chip. Once programmed, an EPROM can be erased by exposing it to strong ultraviolet
light so that it can be reprogrammed with new data.
2.1.4.3
Electrically Erasable Programmable Read-Only Memory
Electrically Erasable Programmable Read-Only Memory (EEPROM) is a type of non-volatile
memory consisting of arrays of floating-gate transistors. It is commonly used to store small
amounts of data such as calibration tables or device configuration.
EEPROM can be programmed and erased electrically using a process called field emission (also
referred to as Fowler-Nordheim tunneling), a quantum mechanical process in which electrons
tunnel through a barrier in the presence of a high electric field.
2.1.4.3.1
Flash memory
Flash memory is a specific type of EEPROM that can be electrically erased and reprogrammed
in large blocks. Because EEPROM erase cycles are slow, the large block sizes used in flash
memory erasing give it a significant speed advantage over old-style EEPROM when writing
large amounts of data.
It is a non-volatile computer memory that is commonly used for data storage in a variety of
devices including memory cards, Universal Serial Bus (USB) flash drives, digital cameras,
Personal Digital Assistants (PDAs) and smartphones (e.g., BlackBerry).
2.2
Media Clearing and Sanitization Methods
2.2.1 Overwriting
Overwriting is the removal or erasure of information from a storage device by writing
combinations of one and zero bits to all storage areas of the drive, thus replacing any existing
data bits.
2.2.1.1
Magnetic Media
To clear a drive for re-use at the same or higher classification level, a single overwrite is usually
sufficient.
To sanitize a hard drive (Protected B and below) using software overwrite utilities, a triple
overwrite involving three passes of the overwrite software is required. In accordance with RCMP
overwrite criteria, as detailed in ITSG-06 Annex B, the first pass writes all ones to the media, the
second pass writes all zeroes (equivalently, the first pass writes all zeroes and the second pass
2009
5
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
writes all ones), and the third pass writes a pseudo-random pattern that can be read back to verify
results.
To sanitize a hard drive (Protected B and below) using a RCMP-qualified implementation of the
ANSI standard “Secure Erase” function, a single pass of the Secure Erase function is acceptable.
2.2.1.2
Solid State Media
In general, overwriting is not recommended for sanitization of solid state media, due to the lack
of overwrite product testing and verification for most solid-state media. However, there are
some Common-Criteria (CC) certified overwrite processes to erase solid-state memory and
storage areas in specified all-in-one printer/copier devices. In addition, there are some overwrite
software products that are RCMP-qualified to erase USB storage devices containing solid-state
memory.
2.2.1.2.1
BlackBerry
In addition there is a CSEC-tested overwrite utility for BlackBerry handheld devices.
2.2.2 Secure Erase (ANSI)
Secure Erase is an overwrite technology developed by the University of California at San Diego
(UCSD) Center for Magnetic Recording Research (CMRR), using a firmware-based process to
overwrite a hard drive. Secure Erase is a hard-drive overwrite command, defined in the
American National Standards Institute (ANSI) Integrated Device Electronics (IDE) Advanced
Technology Attachment (ATA) and Small Computer System Interface (SCSI) disk drive
interface specifications. Secure Erase runs inside drive hardware and completes in about oneeighth the time of a conventional three-pass block software overwrite.
Most ATA drives manufactured after 2001 support the Secure Erase command and successfully
pass Secure Erase validation testing at the CMRR. A Secure Erase standard also exists for SCSI
drives, but it is optional and not currently implemented in most SCSI drives.
2.2.3 Encryption
Although it is not a clearing or sanitization method, strong encryption combined with security of
the encryption key may provide a degree of protection comparable to overwriting, for Protected
B and below. In this context, it refers to whole disk encryption of the entire media over the
entire life cycle of the media. File encryption, folder encryption, or other forms of partial disk
encryption are not sufficient, as they may not encrypt sensitive data residing in temporary files,
page files, deleted files, registry and operating system boot files, unused sectors, slack space, and
hidden partitions.
For guidance on choosing a media encryption product, refer to Media Encryption Guidance.
6
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Media encryption is neither intended by manufacturers - nor recommended by CSEC - to replace
other means of sanitization. It is intended to protect “data at rest” in the event of loss or theft,
which is outside the scope of this annex. For guidance on using encryption to protect lost or
stolen devices, refer to Media Encryption Guidance.
In the context of media sanitization, encryption should be used only for clearing media for re-use
within an equivalently secure environment, or in combination with one of the other media
sanitization methods described herein. For routine disposal, encryption is not a substitute or
replacement for other forms of sanitization, and should be supplemented by an approved
sanitization process.
2.2.4 Degaussing
Degaussing is the application of magnetic force of sufficient power to erase all data on a given
magnetic data storage device. The effectiveness of this method depends on the relative strength
of the magnetic force available in the degaussing product and the magnetic retention properties
of the data storage device. Degausser products are approved by the CSEC on the basis of
independent testing by the CMRR.
2.2.5 Physical Deformation
Physical deformation involves the use of tools such as a sledge hammer, nail gun, vise, etc, to
cause extreme physical damage to a storage device in order to delay, impede, or discourage an
attacker from attempting to recover data from it.
Physical Deformation is primarily intended for emergency destruction when no approved
sanitization method is readily available.
2.2.6 Shredding and Disintegration
2.2.6.1
Shredding
Shredding is a form of destruction that is accomplished by reducing the media to small pieces of
uniform size and shape. Though normally used to destroy paper, some shredders may be suitable
for thin electronic media such as CDs, DVDs, or magnetic stripe cards. Shredders are approved
by the RCMP on the basis of the size and shape of the resulting strips or particles that the cutters
produce.
2.2.6.2
Disintegration
Disintegration is accomplished by a non-uniform cutting or shredding mechanism (e.g., rotating
blades within a closed container) that reduces the media to pieces of random size and shape.
2009
7
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Disintegrators are suitable for a variety of media of almost any size. A screen is utilized on the
output side to catch oversize pieces, which are returned for more shredding.
2.2.7 Material Separation/Fractionation Recycling Technology
Material separation and fractionation is an environmental recycling process in which computer
products can be shredded by multi-stage disintegrators to a size small enough to meet media
sanitization requirements. Later stages of the process may further reduce and separate residue
components to produce commodity-grade materials for recycling.
The centrifuge fractionation process delaminates dissimilar materials to enable separation of
metals from non-metals, so that further reduction techniques can then separate out various “pure”
metals according to their different specific gravities. RCMP approval of sites that offer this
recycling service for destruction of sensitive electronic media is based on the initial three-stage
disintegrator process that occurs before the material ever reaches the centrifuge; the centrifuge
fractionation stages that follow are an environmental bonus.
2.2.8 Grinding, Hole Punching, and Hammer-milling
2.2.8.1
Grinding
Grinding involves using a machine to grind the Electronic Data Storage Device (EDSD) into
small pieces.
2.2.8.1.1
Surface Grinding
Specialized CD surface grinders are capable of reducing the data-bearing layer of an optical disk
to fine powder, while leaving the disk itself intact for recycling or disposal.
2.2.8.2
Hole Punching
An alternative to surface grinding is the use of a special machine to punch thousands of tiny
holes into optical disks (CD or DVD), to destroy the data-bearing layer.
2.2.8.3
Hammer-milling
Hammer mills are durable utility grinders capable of grinding most material. The material is fed
into the device and forced into repeated contact with a series of rotating, hardened hammers that
do the grinding. The mill is encircled by a screen that allows only suitably small-sized particles
to escape.
2.2.9 Incineration
Incineration involves the destruction of EDSDs in incinerators that are environmentally
approved for plastics and other material.
8
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
2.2.10 Knurling
For media sanitization, knurling involves the use of a machine (“knurl rollers”) to apply pressure
and heat to optical disks (CD or DVD) to elongate and curl them to a slight degree. The intent of
this process is to deform the optical “pits” and “lands” on the disk, to effectively destroy the
data.
The potential of this process for destruction and disposal in the Government of Canada (GC) has
not been determined.
3
Security Issues
Security issues are grouped here based on the media clearing and sanitization technology being
considered.
In addition to destroying the data, the sanitization process includes the manual removal of
external indications that the device once contained sensitive data. EDSDs that have been
sanitized may be declassified and disposed of as unclassified waste or surplus material.
3.1
Overwriting
In general, overwriting as a form of sanitization applies only to magnetic media at the level of
Protected B and below. It also may apply to some solid-state media (e.g. Flash), provided that
the overwrite software has been independently verified for effectiveness and completeness of
operation. Not all media types can be overwritten; it may not be possible to overwrite failed
drives and torn or damaged tapes.
3.1.1 Magnetic Media
3.1.1.1
Clearing versus sanitization
To clear magnetic media, overwriting with a single pass, plus verification, is sufficient.
To sanitize magnetic tape, single pass overwrite and verification is sufficient.
To sanitize magnetic disks using software overwrite product, overwriting with at least three
passes plus verification is required. The first pass should be all zeroes (or all ones), and the
second pass should be all ones (or all zeroes); in any event, the second pass should write the
complement of the bits written during the first pass. The third pass should be a pseudo-random
pattern that can be inspected to verify the success of the overwrite process.
To sanitize magnetic disks using a RCMP-qualified implementation of the ANSI Secure Erase
command feature, a single pass is sufficient.
To sanitize core or bubble memory, overwriting the media twice with pseudo-random patterns
and a third time with a known pattern, followed by spot verifications, is recommended.
2009
9
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
3.1.1.2
Calculation of disk space
In order to verify that the overwrite software is not missing any disk spaces, it is critical for the
human operator to compare the accessible amount of disk space as reported by the overwrite
software to the actual amount of disk space as determined from manufacturer documentation, for
the make and model of the hard disk drive that is being overwritten.
To determine the capacity of a hard disk drive:
• Remove cover of Personal Computer (PC) and read the make and model number of the hard
disk drive
• Refer to the manufacturer literature or website for specific technical information on that
model. Disregard the MB or GB ratings, as it will not be clear whether these are computed in
decimal or binary. Note the geometry specification in Cylinders, Heads (sides), Sectors per
track, and sector size (usually 512 bytes).
To avoid confusion, the disk capacity should be computed in number of bytes according to the
following formula:
Cylinders * Heads * Sectors * Sector size
Note:
When calculating disk space, it is important to remember that terms such as kilobyte, megabyte, and
gigabyte do not necessarily refer to exact powers of ten. In binary usage, a kilobyte represents 210, or 1024
bytes; a megabyte represents 220, or 1,048,576 bytes; and a gigabyte represents 230, or 1,073,741,824 bytes.
In decimal usage, however, a kilobyte represents 103, or 1000 bytes; a megabyte represents 106, or
1,000,000 bytes; and a gigabyte represents 109, or 1,000,000,000 bytes.
For a 100 GB drive, therefore, this confusion could result in 7,374,182,400 bytes being unaccounted for. It
is important, therefore, to ensure that the software reporting the disk capacity specifies whether the
capacity is reported in binary or decimal measurements.
3.1.1.3
Software Inability to Address All Disk Spaces
There is a large diversity in the manufacture of hard disk technology and the interfaces with
various operating systems. A given software package may not work reliably on some platforms.
Among the more common problems is the failure of the software to overwrite data in protected
or bad sectors. Often, this data can be retrieved by other software that goes further down in the
software control layers to access disk geography, or by simple laboratory devices – e.g., a spin
scan and recording head would be sufficient (microscopy would not be required).
3.1.1.3.1
The track-edge phenomenon
Data remnants can remain at track boundaries (edges). The read-write heads do not always pass
concentrically over the exact centre of the original bit pattern - mostly due to mechanical and
electrical variables and tolerances. The result is that residual “track edges” of the original bit
patterns may remain on the disk platter even though the bulk of the track has been overwritten.
10
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
These track edges can be detected in a laboratory setting using sophisticated magnetic force
microscopy techniques.
HDD technology does not provide for software to adjust the drive-head positioning mechanism,
therefore it is impossible for any overwrite software to ensure track-edge coverage. Due to the
expense and difficulty of recovering usable data from the track edges, however, this is not
considered to be a security concern for Protected B and below.
3.1.1.3.2
Redundant Arrays of Inexpensive Disks
Redundant Arrays of Inexpensive Disks (RAID) and other forms of file systems may scatter data
across the disks, or may write data in different locations when overwrites occur, using logical
mechanisms in the device driver to prevent accessing the old data. These logical mechanisms
are not sufficient for sanitization as old data may remain on the disks.
3.1.1.4
Independently evaluated overwrite software
Independent evaluation provides assurance that the product does what it claims to do. In the
case of overwriting, there are a number of independently evaluated overwrite products available
for magnetic media, but not generally for solid-state media.
3.1.2 Solid State Media
In general, overwriting as a form of sanitization is not recommended for solid state media, due to
the lack of tested overwrite products for this type of storage medium.
There are some Common Criteria certified overwrite processes to erase solid-state memory and
storage areas for specific devices. In addition, some overwrite products that are RCMP-qualified
to sanitize magnetic media may also be capable of overwriting solid-state USB media.
In all cases, the use of such products to sanitize solid-state media must be accompanied by
careful verification to ensure that the process has fully overwritten all accessible storage areas of
the device.
3.1.2.1
Wear levelling
Wear levelling is a technique for prolonging the service life of some kinds of erasable computer
storage media, such as flash memory.
EEPROM and flash memory media have individually erasable segments, each of which can be
put through a finite number of erase cycles before becoming unreliable. Wear-levelling attempts
to work around these limitations by arranging data so that erasures and re-writes are distributed
evenly across the medium. In this way, no single sector prematurely fails due to a high
concentration of write cycles. These systems distribute the use of cells by internally translating
locations to lesser-used areas, while hiding that fact from the outside. In other words, the
location actually written to is not the location indicated. When a data location is written, it must
be written without intervening buffering or mechanisms.
2009
11
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Some media types, such as flash memory, use wear levelling to prolong the life of the media; in
this case, attempts to write to the drive will be intercepted by the device driver and the actual
sectors overwritten may not be the sectors specified by the software. For this reason, it is
important that the overwriting software access the drive directly, and not through the device
driver.
3.1.2.2
Blackberry
There is a CSEC-tested overwrite utility for BlackBerry handheld devices. This utility is not
available for other devices.
3.2
Secure Erase (ANSI)
3.2.1 Applicable Media
Secure Erase is currently supported by manufacturers in most modern ATA drives, but not
generally in SCSI drives.
3.2.2 Secure Erase Implementations
To activate Secure Erase, UCSD CMRR provides a free download program that will work on
most ATA drives manufactured after 2001. In addition, the RCMP has qualified some
commercial implementations of Secure Erase, contained in hardware products that are available
to GoC departments under NMSO.
3.3
Encryption
The use of encryption for media sanitization refers only to whole disk encryption, in which the
entire drive is encrypted continuously throughout its life cycle.
Whole disk encryption does not usually require specialised training or operator expertise, but
does require IT support staff to be knowledgeable in the configuration and handling of the
encryption product and keying material.
3.3.1 Applicable Media
Encryption in lieu of clearing and sanitization may apply to electronic storage media t the level
of Protected B and below, where the strength of the encryption and the security of the keying
material are known and understood by competent technical authority. In case of doubt, the
encryption should always be complemented by overwriting prior to disposal of the media.
3.3.2 Authentication
For encryption to be used in lieu of sanitization, strong (two-factor) authentication is
recommended. Most commercially available whole disk encryption products support two-factor
authentication methods.
12
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
3.3.3 Storage and destruction of decryption keys
In order to dispose of encrypted media, it is necessary to ensure that the decryption key has been
destroyed. If multiple copies of the decryption key exist, then they all need to be accounted for
and properly destroyed.
If the decryption key is stored on the drive that is being disposed of, the portion of the drive
containing the decryption key needs to be sanitized and the key deleted to an acceptable
standard.
If the decryption key is stored on a drive other than the one being disposed of, it needs to be
either securely deleted or adequately protected, to ensure that it cannot later be matched up with
the drive in question.
If the decryption key is stored on a separate token, the token needs to be sanitized, to ensure the
key is destroyed.
3.4
Degaussing
3.4.1 Applicable Media
Degaussing is applicable only to magnetic media. It cannot be used on paper or film, optical
media such as CDs and DVDs, semi-conductor media such as flash memory devices, or other
non-magnetic media.
For bubble memory, all shielding material must be removed prior to degaussing.
For hard drives, any external shielding material such as brackets must be removed before
degaussing.
3.4.1.1
Failed or damaged media
Degaussing is equally effective on failed or damaged drives, torn tapes, or other magnetic media
that are not writable.
3.4.2 Magnetic coercivity and Magnetic Orientation
3.4.2.1
Magnetic coercivity
Resistance to magnetic change is referred to as coercivity and is measured in Oersteds (Oe). In
general, HDDs manufactured between 1999 and 2003 have coercivity up to 3,000 Oe, and a
degausser must be approved for that level to ensure complete data erasure. HDDs manufactured
in 2004-2005 have coercivity of 4,000 Oe and beyond, with the trend continuing in 2006 to
5,000 Oe, where it is expected to remain through at least 2008.
2009
13
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
The higher the coercivity of a magnetic medium, the more powerful the degausser will have to
be to erase it. Practically, this means that older degaussing equipment may not be designed with
sufficient magnetic strength to degauss newer drives.
3.4.2.2
Magnetic Orientation
Magnetic orientation of data on the disk is another factor that affects degausser capability. On
conventional drives, the magnetic regions are placed horizontally, but since 2006 the magnetic
regions are placed perpendicularly on some hard drives. This enables the drive to squeeze more
data into the same area, but may make the data more resistant to erasure by older degaussers.
3.4.2.3
Future expansion
When purchasing a degausser, it is important to take into consideration the expected lifetime of
the device and ensure that it has sufficient strength to deal with reasonably anticipated increases
in magnetic coercivity as well as the perpendicular magnetic orientation of data on many newer
hard drives.
3.4.2.4
Coercivity ratings
While magnetic tape coercivity ratings are often readily available, hard-disk coercivity ratings
are often considered sensitive proprietary information by the manufacturer, and may not be
obtainable.
In such cases, it is important to ensure that the degausser is strong enough to handle the
maximum coercivity rating available at the time the drives were manufactured.
3.4.3 Re-use after degaussing
Some tapes can be re-used after degaussing, but others cannot. For example, some types of
magnetic tape contain factory-recorded servo tracks that will be destroyed by degaussing,
rendering the tape unusable.
Modern hard drives have such high coercivity that the magnetic field required to erase them will
permanently damage delicate drive components such as the head positioning mechanisms.
3.4.3.1
Warranty coverage
In the case of drives or tapes that fail while under warranty, degaussing may invalidate the
warranty coverage because it prevents the vendor from analyzing why the product failed. This
needs to be taken into consideration in the original purchase contract, or the department should
expect to bear the cost of replacement rather than release a failed drive containing sensitive data
to the vendor.
3.4.4 Maintenance and operation
It is not possible for users to verify that a degaussing operation has properly erased a disk.
Therefore any assurance in the process must come from using and maintaining the degausser
14
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
strictly in accordance with manufacturer instructions, and applying it only to such classes of
drive or tape for which it has been specifically tested and approved. This requires that users be
trained to use and maintain the product correctly.
3.5
Physical Deformation
3.5.1 Applicable Media
Physical Deformation is recommended only for emergency destruction to prevent the imminent
capture of sensitive material by hostile parties. This is not recommended if more effective
techniques are available2.
3.5.2 Acceptable Physical Deformation Techniques
The purpose of the deformation is to damage the media storage areas and read/write mechanisms
to ensure that laboratory reconstruction or analysis will be slow and difficult. Acceptable
Physical Deformation Techniques include use of a nail gun (with the charges but without the
nails); an electric drill; firearm or other high-impact device; crushing in a vise; and a sledge
hammer.
3.6
Shredding and Disintegration
3.6.1 Applicable Media
Shredding applies to sheet stock or thin media such as CDs, DVDs, or magnetic stripe cards.
Disintegration applies to all media types where re-use of the media is not required.
In particular, media that cannot be over-written, or for which there is no approved reliable
overwriting method, are candidates for shredding and disintegration. This includes optical media
(e.g., CD, CD-RW, DVD, etc), solid-state media (e.g., “Flash”), damaged magnetic media (failed
hard drives), and any magnetic media containing data at a level higher than Protected B, as well
as rewritable CDs and DVDs, which do not do a true erase and are not approved for overwriting
as a means of sanitization.
3.6.1.1
Particle Filter
To qualify as valid destruction, the disintegration or shredding must reduce the media to pieces
that meet the maximum acceptable size as determined by a particle filter. The particle filter
2 A digital camera used by William Biggart, a free-lance photojournalist who was killed on September 11,
2001, was found under the wreckage of the World Trade Center North Tower, smashed by tons of falling
rubble. Despite the physical destruction of the camera, the data remained intact; over 150 photographs,
the last one taken only a minute and a half before the tower collapsed, were recovered from the destroyed
camera and published posthumously.
2009
15
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
would be selected to catch oversized pieces and return them for more shredding, while allowing
smaller pieces to pass for disposal.
3.7
Material separation/fractionation recycling technology
This is a new recycling technology available in Canada that has the capability to destroy entire
computers and other equipment, and that separates residual material components for
environmental recycling. The process ensures that only a minimal amount of residue is sent to
land-fill sites.. Two commercial facilities that offer this service – both located near Toronto –
include multi-stage disintegration processes that are suitable for destruction of sensitive
electronic storage media.
3.8
Grinding, Hammer-milling and Pulverization
3.8.1 Applicable Media
These techniques apply to all media types, except where noted below.
3.8.1.1
Surface Grinding for Optical Disks
This process is approved for CDs only, at all levels of sensitivity. The grinding process must
remove all the information bearing layer (the silver coating on the surface of the CD) leaving
behind only the transparent plastic disk.
DVDs cannot be sanitized by surface grinding because the information-bearing layer is
sandwiched in the centre.
Prior to surface grinding, all exterior markings and labels should be removed.
3.8.2 Pulverization
Pulverization is a process of smashing or crushing material. This may be effective for
destruction of hard drives, provided that the pulverization is done to such an extent that the disk
surfaces cannot subsequently be separated from the rest of the destroyed material for laboratory
analysis. Currently, crushing is not an approved sanitization method for hard drives higher than
Protected B.
3.9
Incineration
3.9.1 Applicable Media
Incineration is most commonly used with flammable or burnable material such as paper,
magnetic tape, or plastic.
16
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
3.9.2 Melting or Combustion Point
To ensure complete incineration, the incinerator needs to reach a temperature high enough to
melt or burn the media. For example, to incinerate a hard drive encased in steel, the incinerator
would have to be hot enough to melt the steel casing.
3.9.3 Particle Filter
To prevent oversized pieces from escaping the incineration process, the incinerator must provide
a particle filter that will catch oversized pieces and allow them to be returned for additional
incineration.
3.10 Knurling
There are currently no approved products that use knurling for sanitization of media.
4
Glossary and Acronyms
4.1
Glossary
Clearing
The process of erasing an EDSD in a manner that allows it to be reused within an equivalent or higher security environment (ITSG-06)
Coercivity
Resistance to magnetic change
Knurling
A manufacturing process used to apply pressure and heat to optical
disks (CD or DVD) to elongate and curl them to a slight degree. The
intent of this process is to deform the optical “pits” and “lands” on the
disk to effectively destroy the data
Oersted
A unit of measurement of magnetic coercivity
Sanitizing
The process of erasing or destroying an EDSD in a manner that
precludes any reasonable hope of recovery of the data – i.e., the risk of
compromise following sanitization is low or non-existent (ITSG-06)
Reasonable hope
Reasonable hope exists if a threat agent with opportunity, motivation
and capability believes the presumed value of the data is worth the
time and cost to attempt to recover it (ITSG-06)
2009
17
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
4.2
Acronyms
3DES
Triple-Data Encryption Standard (Triple-DES)
AES
ANSI
ATA
Advanced Encryption Standard
American National Standards Institute
Advanced Technology Attachment
CC
CD
CD-R
CD-ROM
CD-RW
CMRR
CMVP
CSEC
Common Criteria
Compact Disk
CD-Recordable
CD-Read-Only Memory
CD-Rewritable
Center for Magnetic Recording Research
Cryptographic Module Validation Program
Communications Security Establishment Canada
DES
DVD
DVD-R
DVD-RAM
DVD-ROM
DVD-RW
DVD+R
DVD+RW
Data Encryption Standard
Digital Video Disk
DVD-Recordable
DVD-Random Access Memory
DVD-Read-Only Memory
DVD-Rewritable
DVD Plus Recordable
DVD Plus Rewritable
EAL
EDSD
EEPROM
EPROM
Evaluation Assurance Level
Electronic Data Storage Device
Electrically Erasable Programmable Read-Only Memory
Erasable Programmable Read-Only Memory
GB
GC
Gigabyte
Government of Canada
HDD
Hard Disk Drive
IDE
IT
ITSG
Integrated Device Electronics
Information Technology
Information Technology Security Guide
MB
Megabyte
NMD
Non-Magnetic Drive
Oe
Oersted
PC
PDA
PKI
PROM
Personal Computer
Personal Digital Assistant
Public Key Infrastructure
Programmable Read-Only Memory
18
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
RAID
RAM
ROM
RW
Redundant Array of Independent Disks
Random Access Memory
Read-Only Memory
Rewritable
SCSI
Small Computer System Interface
UCSD
USB
University of California at San Diego
Universal Serial Bus
WORM
Write Once-Read Many
2009
19
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Table 1: Security Features Checklist: Media Clearing and
Sanitization
Product Name:
Security Features Checklist for Media Clearing and Sanitization Products
Item
1.0
1.1
Recommended Features
Core Security Functionality
Overwriting – Magnetic Media
For magnetic media at the level of Protected B and below, the product should be
capable of overwriting the entire disk with at least three complete passes in the
case of software overwrite, or it should use a RCMP-qualified implementation of
Secure Erase to provide single-pass sanitization of hard rives that support SE.
1.1.1
Independent Evaluation – Magnetic Media
Software overwrite products, as well as hardware implementations of Secure Erase,
should be independently verified by recognized testing authorities and be RCMPqualified under a PWGSC NMSO.
1.1.2
Training – Magnetic Media
The vendor should provide training and certification in the operation and
maintenance of the product.
1.1.3
Decimal versus Binary Disk Space Calculation – Magnetic Media
When reporting available disk space, the product should specify whether the value
is reported in decimal (powers of 10) or binary (powers of 2) units of measurement.
This will prevent confusion about the actual number of bytes on the media so that
the human operator can accurately determine if the reported disk space matches the
true disk space.
1.2
Overwriting – Solid State Media
The product should be certified by a recognized testing authority for the device or
media being sanitized. Some RCMP-qualified hard-drive overwrite products
available under NMSO may also be capable of overwriting USB solid-state storage
devices.
1.2.2
Verification of Overwrite – Solid State Media
It is essential that the product be capable of verifying that the overwrite process
was fully and properly completed, or provide a means by which the human
operator can verify that the process was fully completed
20
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Security Features Checklist for Media Clearing and Sanitization Products
Item
1.3
Recommended Features
Encryption
For media at the level of Protected B and below. For encryption-based products,
the media should be encrypted in its entirety throughout the entire lifecycle.
1.3.1
Independent Evaluation - Encryption
The product should include an encryption module that has been tested against the
FIPS 140-1 or 140-2 under the CSEC/NIST Cryptographic Module Validation
Program (CMVP), and/or the product should be listed under the CSEC ITS
Prequalified Products Program (IPPP) or other testing program recognized by
CSEC.
1.3.2
Algorithms - Encryption
The encryption-based product should use algorithms approved by the CSEC for use
in the GoC.
1.3.3
Destruction of Decryption Keys
The encryption-based product should allow decryption keys to be securely
destroyed for sanitization.
1.4
Degaussing
Degaussing has no effect on non-magnetic drives such as optical media and semiconductor technology. Degaussers should be used only for the particular magnetic
media classes, types and coercivities for which the degausser product has been
specifically tested and approved.
1.4.1
Independent Evaluation – Degaussers
The product must be approved by the CSEC, based on the NSA Approved
Degausser List, for the type and coercivity of magnetic media to be sanitized.
1.4.2
Proper use & maintenance - degaussing
The degaussing product should be used & maintained strictly in accordance with
manufacturer directions to ensure complete data destruction. This is because it
may not be possible to verify destruction of data on media that has been made
unreadable by the degaussing process; therefore, it is necessary to have high
assurance that the degausser is used & maintained properly.
2009
21
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Security Features Checklist for Media Clearing and Sanitization Products
Item
1.5
Recommended Features
Physical Deformation
For routine destruction, the product should be RCMP-qualified for the type and
sensitivity of media to be sanitized. For emergency destruction, unqualified
products should be used only when data devices are in imminent danger of capture
by hostile parties.
1.6
Shredding and Disintegration
The product should be capable of reducing the media to pieces that meet the
maximum acceptable size specified by the RCMP (explained in the CSEC ITSG06) for the type and sensitivity of media to be destroyed.
1.6.1
Independent Evaluation – shredding…
The product should be listed in the RCMP Security Equipment Guide (SEG) for
the type and sensitivity of media to be destroyed.
1.6.2
Particle Filter – shredding…
The product should incorporate a particle filter to catch oversized pieces and return
them for additional shredding or disintegration, while allowing smaller pieces to
pass for disposal.
1.7
Material Separation/Fractionation Technology
Companies that provide this service should be approved by the RCMP. RCMP
approval ensures that data storage media will be reduced to a sufficient degree to
ensure sanitization, and that departmental inspectors are able to monitor the
progress of their material through the disintegration process at least to the point at
which complete data destruction is assured.
1.8
Grinding, Hammer-Milling, Pulverization
The product should include a filter to ensure that no particles above a predetermined threshold escape.
1.8.1
Independent Evaluation – grinders etc
The product should be listed in the RCMP Security Equipment Guide (SEG) for the
type and sensitivity of media to be destroyed.
22
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Security Features Checklist for Media Clearing and Sanitization Products
Item
1.8.2
Recommended Features
CD Surface Grinding
The product should be capable to completely remove the coloured informationbearing surface layer of a CD. The product should not be used for DVDs because
the data-bearing layer on DVDs is sandwiched in the middle and is not susceptible
to surface grinding.
1.9
Incineration
The product should include a filter to ensure that particles above the RCMPspecified threshold cannot escape incineration.
1.9.1
Completeness of Incineration
The product should provide a means of inspection to ensure that no partially
incinerated particles above the size threshold remain.
1.10
Knurling
This type of technology has not been evaluated by the RCMP or the CSEC and
should not be used.
2.0
2.1
3.0
3.1
4.0
4.1
Conformance to Standards
N/A
Authentication
N/A
Public Key Infrastructure Standards
N/A
5.0
Cryptographic Standards
5.1
Product Testing
The product should be listed under the IPPP or other testing program recognized
by the CSEC, or, as a minimum, the product encryption component should be
certified under the CMVP.
5.2
Algorithms
The media encryption product should use CSEC approved algorithms.
6.0
Assurance
2009
23
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Security Features Checklist for Media Clearing and Sanitization Products
Item
6.1
Recommended Features
Common Criteria Protection Profile and Security Target
For products evaluated under the Common Criteria, the product should be
evaluated to a Protection Profile that addresses security features that are relevant to
the organization, as indicated in the evaluation Security Target report.
6.2
Evaluation Assurance Level
Products chosen from the Common Criteria Evaluated Products List should include
needed security features that have been evaluated to a level that is appropriate for
the intended environment.
7.0
7.1
8.0
8.1
Configurability
N/A
Usability
Training
The vendor should offer training for operators in the use of the product.
8.2
Maintenance
The vendor should offer training for maintainers in the maintenance of the product.
9.0
9.1
10.0
10.1
Manageability
N/A
Scalability
Degree of Scalability
The product should be capable of scaling to service small organizational networks
(i.e. supporting less than 500 users) to large organizational networks (i.e.
supporting 50,000 users or more).
24
2009
UNCLASSIFIED
Media Clearing and Sanitization (CSG-08\G)
Security Features Checklist for Media Clearing and Sanitization Products
Item
10.2
Recommended Features
Accommodation of Future Technology
The product should be capable of accommodating anticipated advances in
technology throughout the expected lifecycle of the sanitization product.
Use of older sanitization techniques on newer media products with improved
technology may result in inadvertent security breaches, as the older technology
may be inadequate to deal with technological advances. For example, the
effectiveness of degaussing products is strongly affected by increases in magnetic
coercivity of hard-disk alloys as well as manufacturer changes in the orientation of
magnetic regions on the disk.
2009
25