ITSG-06 Clearing and Declassifying Electronic Data Storage Devices PDF
ITSG-06 Clearing and Declassifying Electronic Data Storage Devices PDF
ITSG-06 Clearing and Declassifying Electronic Data Storage Devices PDF
IT Security Guidance
JULY 2006
UNCLASSIFIED
ITSG-06
UNCLASSIFIED
ii
July 2006
UNCLASSIFIED
UNCLASSIFIED
Foreword
The Clearing and Declassifying Electronic Data Storage Devices (ITSG-06) is an UNCLASSIFIED publication, issued under the authority of the Chief, Communications Security Establishment (CSE). Suggestions for amendments should be forwarded through departmental communications security channels to your Client Services Representative at CSE. Requests for additional copies or changes in distribution should be directed to your Client Services Representative at CSE. For further information, please contact CSEs ITS Client Services area by e-mail at [email protected] or call (613) 991-7600.
Effective Date
This publication takes effect on July 2006.
____________________________________________________
Sue Greaves Director, IT Security Mission Management
2006 Government of Canada, Communications Security Establishment It is not permissible to make copies or extracts from this publication without the written consent of CSE.
Foreword
July 2006
UNCLASSIFIED
UNCLASSIFIED
ii
July 2006
Foreword
UNCLASSIFIED
UNCLASSIFIED
Table of Contents
Foreword......................................................................................................................... i Effective Date ................................................................................................................. i Table of Contents ......................................................................................................... iii List of Tables ................................................................................................................ iv 1 Introduction ........................................................................................................... 1 1.1 General......................................................................................................... 1 1.2 COMSEC Exceptions ................................................................................... 1 1.3 Government Security Policy ......................................................................... 1 1.4 Departmental Requirements & Considerations ............................................ 2 1.5 Data Retention and Audit Requirements ...................................................... 2 1.6 Sensitivity Labels.......................................................................................... 2 1.7 Structure of the ITSG-06 .............................................................................. 3 Clearing and Sanitization ..................................................................................... 5 2.1 Clearing ........................................................................................................ 5 2.2 Sanitizing...................................................................................................... 5 2.3 Clearing and Sanitization Methods............................................................... 5 2.3.1 Encryption.......................................................................................... 5 2.3.2 Overwriting......................................................................................... 6 2.3.3 Degaussing........................................................................................ 7 2.3.4 Physical Deformation ......................................................................... 8 2.3.5 Shredding and Disintegration............................................................. 8 2.3.6 Materiel/Molecular Separation by High-Speed Centrifuge ................. 9 2.3.7 Grinding and Hammer-milling ............................................................ 9 2.3.8 Incineration ........................................................................................ 9 2.3.9 Knurling.............................................................................................. 9 Handbook on Clearing, Sanitization and Destruction...................................... 11 3.1 Destruction Technologies, Techniques and Equipment ............................. 11 3.2 Clearing for Re-Use within a Department ................................................... 12 3.3 Sanitizing for Declassification and Disposal ............................................... 12 3.4 Special Considerations Emergency situations, and Overwriting.............. 13 3.4.1 Emergency Destruction.................................................................... 13 3.4.2 Overwriting....................................................................................... 13 3.4.3 Overwriting PDAs and BlackBerrys ................................................. 13
July 2006 iii
UNCLASSIFIED
UNCLASSIFIED
Destruction Standards - Magnetic Media.................................................... 14 Destruction Standards - Optical Media ....................................................... 16 3.6.1 Exceptions ....................................................................................... 18 Destruction Standards - Miniature Electronic Storage Devices & PDAs..... 18
Annex A : ACRONYMS AND ABBREVIATIONS ....................................................... 21 Annex B : DESTRUCTION PROCEDURES ............................................................... 23 Annex C . OVERWRITE UTILITIES FOR HARD DRIVES .......................................... 33 Annex D . DEGAUSSER PRODUCTS ........................................................................ 41 Annex E : PARTIAL DESTRUCTION SECURITY ISSUES ..................................... 45 Annex F : TYPES OF STORAGE DEVICES............................................................... 47 Annex G : CSE AND RCMP CONTACT POINTS ....................................................... 53 Annex H : REFERENCES ........................................................................................... 55
List of Tables
Table 1: Destruction Methods ...................................................................................... 11 Table 2. Portable Memory Devices (c.2005) ................................................................ 49
iv
July 2006
Table of Contents
UNCLASSIFIED
UNCLASSIFIED
1
1.1
Introduction
General
This guideline is intended to assist Government of Canada IT authorities in the selection of suitable methods to prepare Electronic Data Storage Devices (EDSD) for declassification, reuse or disposal. This guideline outlines the baseline standards approved by the RCMP and CSE for clearing and sanitizing different types of EDSD, and describes a range of methods to meet those standards. Methods are recommended based on specified levels of data sensitivity within a range of typical GoC operating environments.
1.2
COMSEC Exceptions
This guideline does not apply to Communications Security (COMSEC) equipment and/or key materiel. Refer to relevant Canadian Cryptographic Doctrine (CCD) manuals for COMSEC handling instructions.
1.3
The Government of Canada Security Policy (GSP) requires that federal departments and agencies establish and implement a security program that covers organizational, physical and personnel security as well as information technology security. While the GSP is supported by operational and technical security standards that define baseline security requirements, the GSP makes departments and agencies responsible for detailed implementation. In addition, departments and agencies must conduct their own Threat and Risk Assessments (TRA) to determine the need for safeguards above baseline levels specified in the standards. The GSP requires departments and agencies to conduct active monitoring and assessments of their security program. In order to assess policy compliance and to provide feedback on the effectiveness of the policy, departments are required to provide reports to the Treasury Board Secretariat on the results of these internal assessments or audits. It is crucial that departments understand the security requirements for the handling of information processing and storage devices that contain Protected or Classified information. The minimum requirements for the clearing, sanitization and destruction of EDSDs, as described in this document, have been approved by the Communications Security Establishment (CSE) and the Royal Canadian Mounted Police (RCMP). The Access to Information Act and the Privacy Act (ATIP) should be read, along with the GSP and its supporting Operational Standards, for a more detailed discussion on the classification and handling of Protected and Classified information.
Introduction July 2006 1
UNCLASSIFIED
UNCLASSIFIED
1.4
Departments and agencies are required to perform TRAs to consider the unique circumstances of each user group in light of the complex nature of the threat environment and the rapid rate of change in electronic data storage technology. To ensure that sensitive information is not compromised or exposed, proper control of sensitive EDSDs must be maintained at all times by users and managers. Departmental security policies should address the requirement for procedures for labelling, storing, declassifying/downgrading, destruction and/or erasure of sensitive materiel.
1.5
Departments must address legal and policy requirements for data retention periods and audit, etc, before approving media for erasure or destruction. This includes:
legal requirements under the Access to Information and Privacy Acts (ATIP) regarding retention of public records; policy requirements under relevant TBS information management policies regarding the keeping of government records; security audit requirements for data retention that could be required as evidence in investigative or legal proceedings; and security audit requirements to maintain complete records of destruction and disposal of government records, information and equipment.
1.6
Sensitivity Labels
EDSDs that are used to store sensitive information should be appropriately labelled in accordance with relevant GSP Operational Standards. The labels should be retained until the sensitive information is declassified, downgraded or erased by trustworthy means or until a point in time immediately preceding the physical destruction of the media.
July 2006
Introduction
UNCLASSIFIED
UNCLASSIFIED
1.7
This guideline is divided into four (4) sections: 1. Introduction - This section provides background information pertaining to the proper disposal and/or re-use of information processing devices. 2. Clearing, Sanitization, and Destruction Methods This section introduces the various methods for destruction of data and/or devices. 3. Handbook of Clearing, Sanitization, and Destruction Methods This section describes RCMP/CSE approved destruction standards for all types of storage devices, separated into the three overall categories of magnetic, optical, and miniature storage media. For each type, the approved standard of destruction is based on the assessed sensitivity of the stored data. 4. Annexes - The Annexes provide detailed explanations of various aspects of device re-use, clearing, or sanitization.
Introduction
July 2006
UNCLASSIFIED
UNCLASSIFIED
July 2006
Introduction
UNCLASSIFIED
UNCLASSIFIED
Many security methods are used to protect sensitive data during handling and storage on IT systems. However, would-be attackers may be able to recover sensitive information from discarded storage media. This guideline addresses security issues related to the change of use or disposal of electronic data storage devices (EDSD), and the methods for properly destroying stored data to reduce or eliminate the threat of unauthorized access.
2.1
Clearing
Clearing is the process of erasing an EDSD in a manner that allows it to be re-used within an equivalent or higher security environment. Clearing must be adequate to prevent data recovery using tools normally available on the Information System. Simply deleting or erasing the files or formatting a disk does not clear the media, because commands such as undelete or unformat may permit the recovery of the data. The clearing process is not expected to be proof against hands-on recovery methods using specialized IT utilities or laboratory techniques. For this reason, cleared media must be retained within security environments appropriate to the highest level of data the media once contained, and cannot be considered for declassification.
2.2
Sanitizing
Sanitizing is the process of erasing or destroying an EDSD in a manner that precludes any reasonable hope* of recovery of the data i.e., the risk of compromise following sanitization is low or non-existent. In addition to destroying the data, the sanitization process includes the manual removal of external indications that the device once contained sensitive data. EDSDs that have been sanitized may be declassified and disposed of as unclassified waste or as surplus equipment for sale or recycling. *Reasonable hope: if a threat agent with opportunity, motivation and capability believes the presumed value of the data is worth the time and cost to attempt to recover it.
2.3
2.3.1 Encryption
Encryption of the entire media (not just files and folders) over the life cycle of the media using encryption products that have been approved by CSE for that particular application and for the level of
Clearing and Sanitizing July 2006 5
UNCLASSIFIED
UNCLASSIFIED
sensitivity of the data being stored, may be considered equivalent to sanitizing prior to end-of-life disposal of the media. In the case of a laptop, for example, the encryption provides some assurance of protection of the data even in the event of loss or theft of the device. For routine disposal, however, the encryption should be supplemented by an approved overwrite process to preclude any possibility that an attacker could recover the decryption key from the hard drive. The effectiveness of encryption in providing ongoing protection of the data depends on three factors: the strength of the cryptographic protection scheme as implemented by the vendor; the management of the encryption key by the user organization; and the avoidance of attack motivators. Given opportunity and time, a capable adversary may recover the data if sufficiently motivated to make the effort. Approved* encryption methods are a deterrent because they ensure that the level of effort involved in recovery will exceed the expected value of the data to be recovered. *Commercial products often have serious weaknesses in their underlying encryption schemes. CSE validation ensures that such weaknesses are found - and the vendor is notified to correct the problem prior to approval for Government use.
2.3.2 Overwriting
Overwriting is the removal or erasure of information from a storage device by writing 1 and/or 0 data bits to all storage areas of the device, thus replacing any existing intelligence bits. The effectiveness of this method depends on the number of overwrite cycles (to overcome the track-edge phenomenon1), the skill and knowledge of the person conducting the overwrite process, and overwrite software verification features (if any) to help ensure that overwrite is accomplished over the entire accessible storage area of the media. Triple Overwrite. Triple overwrite is a process involving three passes of the overwrite software. In accordance with RCMP overwrite criteria, the first pass must write all 1s or all 0s to the media, the second pass must write the complement (or opposite) of the first pass, and the third pass must be a pseudo-random pattern that the human operator can read back to verify results.
1 Track-Edge Phenomenon: Data remnants can remain at track boundaries (edges). The read-write heads do not always pass concentrically over the exact centre of the original bit pattern - mostly due to mechanical and electrical variables and tolerances. The result is that residual track edges of the original bit patterns are left on the disk platter even though the bulk of the track will have been overwritten.
July 2006
UNCLASSIFIED
UNCLASSIFIED
Secure Erase. Since about 2001, all ATA IDE and SATA hard drive manufacturer designs include support for the Secure Erase standard2. However, SCSI and Fibre Channel hard drives do not support the Secure Erase standard and can be overwritten only by using third-party software products.
RCMP overwriting standards: choose a software product that meets RCMP overwrite criteria3 and that has undergone an independent laboratory analysis, e.g., tested to a relevant profile under the Common Criteria. Verification features: ensure the product has software features that help the operator to determine whether or not the overwrite software is able to access (and has accessed) the entire known storage area of the disk.
Overwriting as a Stand-Alone Method. For magnetic storage media such as hard disks and tape, etc, triple overwrite is recognized as a stand-alone method for destruction of data at the level of Protected B and below, and may be deemed suitable for Confidential as well. Overwriting in Combination with Other Destructive Methods. For magnetic storage media that contains Protected C or Classified information higher than Confidential, triple overwrite is not suitable as a standalone data destruction method. However, in combination with other incomplete destruction procedures such as disintegration or shredding, a triple overwrite may provide additional assurance that information is destroyed beyond reasonable hope of recovery.
2.3.3 Degaussing
Degaussing is the application of magnetic force of sufficient power to erase all data on a given magnetic data storage device. The effectiveness of this method depends on the relative strength of the magnetic force available in the degausser product and the magnetic retention properties of the data storage device. Degausser products4.must be properly maintained and operated to be effective.
2 Secure Erase: a standard developed by the University of California San Diego (UCSD) Center for Magnetic Recording Research (CMRR) and subsequently adopted by hard drive manufacturers to enable user organization security staff to effect sure and simple erasure of all accessible parts of the hard-drive prior to disposal. See Annex B and Annex H. 3 RCMP criteria for disk overwrite: Sanitize a drive via triple overwrite using the RCMP DSX utility software or third-party equivalent (or Secure Erase if the hard drive supports the Secure Erase standard). In general, overwrite software must make three passes - the first two write binary 0s; the second to write binary 1s; and the third to write an ASCII text pattern that the operator can later verify.. For example, the text pattern could comprise the name of the overwrite software product, along with the version number and current timestamp. 4 Degaussing: When using a degausser, the operator must be aware of the strength of the degaussing device versus the actual magnetic retentivity (or coercivity as measured in Oersteds) of the magnetic media. The operator must ensure that the
July 2006
UNCLASSIFIED
UNCLASSIFIED
selected degausser is approved for the coercivity of the media to be degaussed. Failure to do so may result in incomplete destruction of the data on the media.
July 2006
UNCLASSIFIED
UNCLASSIFIED
2.3.8 Incineration
Incineration involves the destruction of EDSDs in incinerators that are environmentally approved for plastics and other materiel.
2.3.9 Knurling
Knurling involves the use of a machine to apply pressure and heat to optical disks (CD or DVD) to elongate and curl them to a slight degree. This intent of this process is to destroy the optical pits and lands on the disk to effectively destroy the data. The potential of this process for destruction and disposal is under investigation.
July 2006
UNCLASSIFIED
UNCLASSIFIED
10
July 2006
UNCLASSIFIED
UNCLASSIFIED
This section provides an overview of clearing & sanitizing methods, and destruction standards, for all known types of electronic data storage devices. Detailed explanations about the various methods and associated security issues are provided in the Annexes. In addition, Departments should consult the GSP Operational Standards and relevant CSE and RCMP guidelines regarding the proper handling of sensitive information and storage devices throughout their life cycle.
3.1
Accepted destruction technologies are listed below. See Annex B for detailed explanations.
July 2006
11
UNCLASSIFIED
UNCLASSIFIED
Note: off-site media destruction must be closely observed by departmental security staff, and external labels that denote sensitivity must be removed prior to destruction and disposal.
3.2
Single overwrite (a single pass of the overwrite software) may be used to clear magnetic disks for re-use within the Department in an equivalent or higher security environment. In this context, clearing enforces the need-to-know restriction within a group of users. Downgrading Top Secret. Triple overwrite, which is more effective than single overwrite, may be used to clear Top Secret media for re-use within the Department in a Secret-level environment. Security Issues with Overwriting: If the overwrite process is successful, then it will be difficult for an attacker to recover data in the laboratory. However, the overwrite process is not always completely successful due to human error and/or the inability of software utilities that function at the application layer to overwrite bad sectors or hidden partitions, which may contain sensitive data. Given direct access to the hard drive, an attacker could recover that data using simple software tools, without the need of a laboratory. For these reasons, overwrite is not accepted as a stand-alone destruction method for disposal of magnetic media containing data that is extremely sensitive (Protected C or Secret and above); however, it is acceptable for clearing the media for re-use within a controlled security environment i.e., within a community of users who lack the need to know but do have appropriate security clearances for the level of information that may continue to reside on hidden portions of the cleared storage media.
3.3
Sanitize media prior to declassification for re-use in a less secure environment and/or release of the media outside the control of the government of Canada. Remove all markings or other external indications of the sensitivity of the data that was formerly stored on the media, and destroy the data or the device in accordance with the appropriate instructions5.
Some adversaries have the means to do sophisticated laboratory analyses of incompletely destroyed magnetic media, and may make the attempt if they acquire magnetic media or fragments from a source of sufficient interest to justify the time and cost of laboratory analysis.
12
July 2006
UNCLASSIFIED
UNCLASSIFIED
3.4
3.4.2 Overwriting
For disposal of magnetic disks outside the controlled security environment, overwriting must be preceded by a comparison of the reported disk capacity (as determined by the overwrite software) versus the actual disk capacity (as calculated by the human operator). The purpose is to check for unread or hidden data repositories that cannot be accessed by the overwrite software at the application layer but could be accessible to an attacker using software tools such as a disk editor that operates at a lower level. The overwrite process itself must include a minimum of three passes including 1s, 0s, and a pseudo-random pattern over the entire accessible area of the magnetic tape or disk, followed by verification of results by the human operator.
UNCLASSIFIED
UNCLASSIFIED
LOSS OR THEFT OF A BLACKBERRY UNIT: As confirmed by CSE, the BlackBerry user data is deleted by over-writing when the maximum number of attempted passwords is exceeded or when the BES administrator successfully sends a Kill command to the device. However, if the Kill command is not received or executed, then a laboratory attack could be mounted on the memory module to read non-encrypted user data. To guard against loss or theft, therefore, departments should complement the above protections with Policies to govern the handling of the device and what types of information may be stored on it (maximum Protected A, or Protected B if the SMIME option is installed and correctly used).
MALFUNCTIONING PDAs:
As a matter of policy, departments should require the deletion of user data from all PDA devices before disposal or before returning such devices to the vendor. Unfortunately, it may not be possible to delete the user data if the device is malfunctioning and it is possible that data stored on a failed PDA device may be recoverable by parties with laboratory resources. Departments should assess the risk on a case-by-case basis, considering both the value of the data and the potential impact of disclosure. If the risk is deemed medium or high, then the device should not be released from departmental control. Instead, it should be destroyed using approved destruction methods, and the cost of replacement should be seen as a necessary security measure.
3.5
14
July 2006
UNCLASSIFIED
UNCLASSIFIED
Data Overwrite Declassification Standards Unclas , PA, PB C PC, S TS Disks or Tape: Triple overwrite. Disks or Tape: Triple overwrite* Disks or Tape: Triple overwrite PLUS shredding/disintegration or grinding as for PA/PB. Disks or Tape: Triple overwrite PLUS shredding/disintegration or grinding as for Secret. Shredding, Disintegrating and Grinding Destruction Standards
Unclas , PA, PB
Disks: at least 3 pieces, each maximum area < 580 mm2 (e.g., 3x3). Magnetic tape**: pieces, each maximum length < 50 mm (2). Stripe cards: pieces, each maximum area < 160 mm2 (e.g., 1/2x1/2).
Note: triple overwrite may be used to downgrade TopSecret media (for subsequent disintegration or shredding as for Secret).
PC, C, S
Disks: at least 3 pieces, each maximum area Magnetic tape: pieces, each maximum length Stripe cards: pieces, each maximum area Disks: at least 3 pieces, each maximum area 1/8x1/8). Magnetic tape: pieces, each maximum length Stripe cards: pieces, each maximum area Incineration
< 40 mm2 (e.g., 1/4x1/4). < 6 mm (1/4). < 10 mm2 (e.g., 1/8x1/8). < 10 mm2 I (e.g., < 3 mm (1/8). < 10 mm2 (e.g., 1/8x1/8). Incinerators Facilities approved by Environment Canada for mixed plastics, etc.
TS
All Levels
Total destruction.
July 2006
15
UNCLASSIFIED
UNCLASSIFIED
Destruction Tools Focused high-impact tool, vise, sledgehammer, etc. Degaussing Products Degausser must be CSE-approved for coercivity of the specific media.
Degaussing Carefully follow degausser product manufacturer directions for tapes and disks. Degauss hard drives twice (for the second pass, turn the drive around in the chamber).
All Levels
*Triple overwrite by itself may be deemed sufficient to declassify Confidential media. However, media containing Protected C or Secret information require additional shredding/disintegration or grinding as indicated above. **Exception for Digital Linear Tape (DLT): the standard for disintegration of large quantities of DLT may be relaxed to avoid disassembly for removal of internal metal rings prior to disintegration in medium-robust shredders.
Encryption: Full-disk encryption for hard drives, or file encryption for tapes, using encryption
products approved by CSE for that purpose and for the level of sensitivity of the stored data, provides reliable protection for data at rest (device turned off or user not logged on) and is an effective deterrent to recovery by casual attackers. Depending on departmental TRAs, encryption may obviate the need for destruction prior to disposal of media containing data that is Protected B or less. For higher sensitivities, encryption should not be deemed sufficient for disposal but may be combined with more destructive techniques e.g., shred encrypted TopSecret media as though it were Secret.
3.6
16
July 2006
UNCLASSIFIED
UNCLASSIFIED
Encryption Declassification Standards Unclas , PA, PB PC, C, S TS Disk or file encryption. Disk/file encryption PLUS shredding/disintegration or grinding as for PA/PB. Disk/file encryption PLUS shredding/disintegration or grinding as for Secret. Shredding, Disintegration and Grinding Destruction Standards Unclas , PA, PB CDs only: grind the disk surface to remove the coloured data layer; or CDs or DVDS: shred into small pieces < 160mm2 in area (e.g., 1/2x1/2). CDs only: grind the disk surface to remove the coloured data layer; or CDs or DVDS: shred into small pieces < 36mm in area (e.g., 1/4x1/4). CDs only: grind the disk surface to remove the coloured data layer; or TS CDs or DVDS: shred into small pieces <10mm2 in area (e.g., 1/8x1/8). Incineration All Levels
2
Encryption Products CSE IPPL CSE-approved Type I encryption. CSE-approved Type I encryption. Destruction Products
PC, C, S
Approved Incinerators Facilities approved by Environment Canada for the incineration of mixed plastics, etc.
Total destruction.
July 2006
17
UNCLASSIFIED
UNCLASSIFIED
3.6.1 Exceptions Overwriting: o at the present time, overwriting is not approved for declassification and disposal of optical media containing sensitive information. Degaussing: o degaussing has no effect on optical storage disks and therefore is not approved for them. Knurling: o at the present time, knurling is not approved for declassification and disposal of optical media containing sensitive information. Surface Grinding: o removes the coloured layer of CDs where the data resides; however, this method does not work for DVDs where the information bearing layers are sandwiched in the centre.
3.7
Encryption Products CSE IPPL CSE-approved Type I encryption. CSE-approved Type I encryption.
18
July 2006
UNCLASSIFIED
UNCLASSIFIED
Data Overwrite Declassification Standards Unclas , PA, PB Flash EEPROM storage devices: overwrite all storage locations with a known pattern, then read back the expected pattern at random locations to verify. If the device is equipped with an erase function, then execute the erase function as a final step. Flash EEPROM storage devices that have a CSE-approved erase function: execute & verify the overwrite & erase functions in accordance with CSE guidance for the specific storage device product. Flash EEPROM storage devices without an approved erase function: overwrite all storage locations 10 times with a known pattern and its binary complement, then verify by reading random locations. Execute the erase function (if so equipped) as a last step. Shredding, Disintegration and Grinding Destruction Standards Unclas , PA, PB PC, C, S, TS Miniature drives or Flash/EEPROM devices: reduce the device to pieces, each with maximum area < 160mm2 in area (e.g., 1/2x1/2). Miniature drives or Flash/EEPROM devices: grind or pulverize the storage chip or the entire storage device into small pieces < 2mm in size, using a 3/32-inch screen. Incineration All Levels Total destruction. Emergency Destruction All Levels Refer to the Annex on Emergency Destruction.
Overwrite Products RCMP Security Equipment Guide (SEG). Note: If a malfunction prevents overwriting, then destroy the device by other approved method. In the case of a nonapproved erase function, the verification stage is essential i.e., if the success of the overwrite cannot be verified, then destroy the device by other approved method. Destruction Products
PC, C, S, TS
Incinerator Facilities Environment Canada approved for plastics, etc. Deformation Tools Focused high-impact tool, vise, sledgehammer, etc.
July 2006
19
UNCLASSIFIED
UNCLASSIFIED
Exceptions: Degaussing: Degaussing is ineffective against miniature electronic storage devices and other devices that use Flash (EEPROM) semi-conductor storage chips and, therefore, is not approved for them. Volatile Memory (RAM, DRAM, SRAM): Volatile memory loses its data when electrical power is removed but traces may linger for a short time due to cold temperature or electrical capacitance (especially for SRAM devices). Volatile memory should not be considered erased until 24 hours without power has passed. Clear Command: PDAs use non-volatile memory (Flash EEPROM) to retain data when power is removed. Some PDA models provide a Clear Command to overwrite and/or erase this memory, but in most cases the process has not been independently verified and therefore is not approved for declassification and disposal of PDAs that contain extremely sensitive information. Exceptions may be made ONLY on products for which the CSE has specifically approved a built-in or add-on erasure process.
20
July 2006
UNCLASSIFIED
UNCLASSIFIED
July 2006
21
UNCLASSIFIED
UNCLASSIFIED
HDD IDE IPPL ITS MMC NSA NTFS PC PC Card PCMCIA PDA r/w or R/W RAM RAID RIM RS-MMC SATA SCSI SD TBS TRA UCSD USB USO
Hard Disk Drive Integrated Drive Electronics ITS Prequalified Products List (a CSE Industry Program for product evaluations) Information Technology Security Multi-Media Card National Security Agency (U.S. government) New Technology (NT) File System Personal Computer Replacement name for PCMCIA Personal Computer Memory Card International Association Personal Digital Assistant Read/Write Random Access Memory Redundant Array of Independent Disks Research In Motion Corporation (manufacturer of the BlackBerry PDA) Reduced Size MMC Serial Advanced Technology Architecture Small Computer System Interface Secure Digital (card) Treasury Board Secretariat of Canada Threat and Risk Assessment University of California San Diego (see CMRR) Universal Serial Bus Universal Secure Overwrite (UCSD CMRR Secure Erase)
22
July 2006
UNCLASSIFIED
UNCLASSIFIED
B.1 Clearing
Reusable media, such as magnetic disks, re-writable optical disks, and memory-based devices may be cleared for re-use in the same (or equivalent or higher) security environment by overwriting all accessible locations with a single pass of 1s and/or 0s, and then verifying that the process was successful. Software overwrite utilities that function at the application level will not overwrite data that may be contained in bad sectors or hidden partitions. Furthermore, successfully overwritten data may still be recoverable in a laboratory setting. Therefore, magnetic disks that have been cleared by overwriting must be retained within a departmental security environment appropriate for the level of information previously stored on the disk. Clear core memory units and magnetic bubble memory of all levels of sensitivity by overwriting all locations with two pseudo-random patterns and a third known pattern followed by verification. Core memory units can be degaussed with an approved degausser.
Annex B: Destruction Procedures July 2006 23
UNCLASSIFIED
UNCLASSIFIED
Some USB thumb-drives and Flash cards, etc, may contain inaccessible non-volatile memory that cannot be cleared. This may require a more drastic destruction technique (see below).
B.2 Sanitizing
The sanitizing process is appropriate for erasable or reusable media such as magnetic disks, tapes, USB thumb-drives, flashcards, CD-RWs, etc. Prior to declassification and/or release outside the control of the department these reusable devices must be adequately sanitized and their data destroyed. Remove all markings or other external indications of the sensitivity of data formerly stored on the EDSD, and destroy it (or the data within it) in accordance with the instructions below. Note that most adversaries lack the means to do sophisticated laboratory analyses of incompletely destroyed magnetic disks. However, some adversaries may have that capability, and may make the attempt if they acquire magnetic disks or fragments from a known source of sufficient interest to them to justify the time and cost of laboratory analysis. Non-erasable or reusable media, such as CD-ROMS and DVDs, must be disposed of according to the instructions below. Core memory units and magnetic bubble memory of all levels of sensitivity can usually be sanitized by one of the following methods (and removing all markings or other external indicators of sensitivity): Overwriting all core or bubble memory locations two times with a pseudo-random pattern followed by a known pattern, and then doing spot-verifications to confirm that only the known pattern can be read. Degaussing core or bubble memory devices with an approved degausser. In the case of bubble memory, all shielding materiel must be removed from the device before degaussing. Pulverizing, smelting or disintegrating core memory. Collapsing bubble memory by raising bias voltages on bubble memory devices that are equipped with bias controls (consult manufacturer for technical guidance).