<section title="12.6. Product Sanitisation and Disposal"><subsection title="Objective"><paragraph
    title="12.6.1."


><![CDATA[<p>All IT equipment is sanitised and disposed of in an approved and secure manner.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="12.6.2."


><![CDATA[<p>This section covers information on sanitising and disposing of both evaluated and non-evaluated IT equipment. Additional information on the sanitisation, destruction and disposal of media can be found in <a title="Media and IT equipment management, decommissioning and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media and IT equipment management, decommissioning and disposal</a>.</p>]]></paragraph>
<paragraph
    title="12.6.3."


><![CDATA[<p>Media typically found installed in IT equipment are electrostatic memory devices such as laser printer cartridges and photocopier drums, non-volatile magnetic memory such as hard disks, non-volatile semi-conductor memory such as flash cards and volatile memory such as RAM cards. Some technologies, such as an FPGA, may integrate memory capabilities.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Sanitisation or destruction of IT equipment"><paragraph
    title="12.6.4.R.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>In order to prevent the disclosure of classified information into the public domain agencies will need to ensure that IT equipment is either sanitised or destroyed before being declassified and authorised for released into the public domain. Refer also to <a title="Media and&nbsp;IT Equipment Management, Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 - Media and&nbsp;IT Equipment Management, Decommissioning and Disposal</a>.</p>]]></paragraph>
<paragraph
    title="12.6.4.C.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3537"
><![CDATA[<p>Agencies MUST sanitise or destroy, then declassify, IT equipment containing <strong><span style="text-decoration: underline;">any</span></strong> media before disposal.</p>]]></paragraph>
<paragraph
    title="12.6.4.C.02."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3540"
><![CDATA[<p>IT equipment and associated media that have processed or stored NZEO information, and cannot be sanitised, MUST be returned to New Zealand for sanitisation or destruction, declassification and disposal.</p>]]></paragraph>
</block>
<block title="Disposal of IT equipment"><paragraph
    title="12.6.5.R.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>When disposing of IT equipment, agencies need to sanitise or destroy and subsequently declassify any media within the product that are capable of storing classified information. Once the media have been removed from the product it can be considered sanitised. Following subsequent approval for declassification from the owner of the information previously processed by the product, it can be disposed of by the agency.</p>]]></paragraph>
<paragraph
    title="12.6.5.R.02."

    tags="IT Equipment,Technical,Disposal,High Assurance Products,Product Sanitisation,Product Security"


><![CDATA[<p>The GCSB provides specific advice on how to securely dispose of high assurance products, HACE and TEMPEST rated equipment. There are a number of security risks that can occur due to improper disposal, including providing an attacker with an opportunity to gain insight into government capabilities.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.01."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3545"
><![CDATA[<p>Agencies MUST have a documented process for the disposal of IT equipment.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.02."

    tags="IT Equipment,Technical,Disposal,High Assurance Products,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3547"
><![CDATA[<p>Agencies MUST contact the GCSB and comply with any requirements for the disposal of high assurance products.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.03."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3549"
><![CDATA[<p>Agencies MUST contact the GCSB and comply with any requirements for the disposal of HACE.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.04."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3550"
><![CDATA[<p>Agencies MUST contact GCSB and comply with any requirements for the disposal of TEMPEST rated IT equipment or if the equipment is non-functional.</p>]]></paragraph>
<paragraph
    title="12.6.5.C.05."

    tags="IT Equipment,Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3552"
><![CDATA[<p>Agencies MUST formally sanitise and then authorise the disposal of IT equipment, or waste, into the public domain.</p>]]></paragraph>
</block>
<block title="Sanitising printer cartridges and copier drums"><paragraph
    title="12.6.6.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Electrostatic drums can retain an image of recently printed documents providing opportunity for unauthorised access to information. Some printer cartridges may have integrated drums. Printing random text with no blank areas on each colour printer cartridge or drum ensures that no residual information will be kept on the drum or cartridge.</p>]]></paragraph>
<paragraph
    title="12.6.6.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="Top Secret, Secret, Confidential"
    compliance="Must"
    cid="3555"
><![CDATA[<p>Agencies MUST print at least three pages of random text with no blank areas on each colour printer cartridge with an integrated drum or separate copier drum.</p>]]></paragraph>
<paragraph
    title="12.6.6.C.02."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3557"
><![CDATA[<p>Agencies SHOULD print at least three pages of random text with no blank areas on each colour printer cartridge with an integrated drum or separate copier drum.</p>]]></paragraph>
</block>
<block title="Destroying printer cartridges and copier drums"><paragraph
    title="12.6.7.R.01."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


><![CDATA[<p>When printer cartridges with integrated copier drums or discrete drums cannot be sanitised due to a hardware failure, or when they are empty, there is no other option available but to destroy them.</p>]]></paragraph>
<paragraph
    title="12.6.7.C.01."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3561"
><![CDATA[<p>Agencies unable to sanitise printer cartridges with integrated copier drums or discrete copier drums, MUST destroy the cartridge or drum.</p>]]></paragraph>
<paragraph
    title="12.6.7.C.02."

    tags="Technical,Disposal,Media Destruction,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Should"
    cid="3563"
><![CDATA[<p>Agencies unable to sanitise printer cartridges with integrated copier drums or discrete copier drums, SHOULD destroy the cartridge or drum.</p>]]></paragraph>
</block>
<block title="Disposal of televisions and monitors"><paragraph
    title="12.6.8.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Turning up the brightness to the maximum level on video screens will allow agencies to easily determine if information has been burnt in or persists upon the screen.</p>]]></paragraph>
<paragraph
    title="12.6.8.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3566"
><![CDATA[<p>Agencies MUST visually inspect video screens by turning up the brightness to the maximum level to determine if any classified information has been burnt into or persists on the screen, before redeployment or disposal.</p>]]></paragraph>
</block>
<block title="Sanitising televisions and monitors"><paragraph
    title="12.6.9.R.01."

    tags="Technical,Product Sanitisation,Product Security"


><![CDATA[<p>All types of video screens are capable of retaining classified information on the screen if appropriate mitigation measures are not taken during the lifetime of the screen. CRT monitors and plasma screens can be affected by burn-in whilst LCD screens can be affected by image persistence which can led to LED/OLED burn-in.</p>]]></paragraph>
<paragraph
    title="12.6.9.C.01."

    tags="Technical,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="3572"
><![CDATA[<p>Agencies MUST attempt to sanitise video screens with minor burn-in or image persistence by displaying a solid white image on the screen for an extended period of time. If burn-in cannot be corrected the screen MUST be processed through an approved destruction facility.</p>]]></paragraph>
</block>
<block title="LCD/LED, plasma and non-CRT monitor types"><paragraph
    title="12.6.10.R.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Current generations of monitors incorporate controllers to manage power up/power down, manage the display, operate any USB or other ports and manage the video data stream.&nbsp; The controller requires memory to operate and it incorporates some data storage capability and full write/read access to the display.&nbsp; It also retains settings and configuration.&nbsp; The underlying technology is often based on an FPGA and invariably requires some form of memory capability in order to operate.&nbsp; <br> <br> Researchers have demonstrated that images can be recovered by directly accessing the controller and associated memory or analysing the orientation of the liquid crystals.</p><p>In addition monitors can be compromised to actively monitor or covertly steal data and even manipulate what is displayed on the screen.&nbsp; Other attacks exploiting monitors have also been demonstrated.</p>]]></paragraph>
<paragraph
    title="12.6.10.R.02."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


><![CDATA[<p>Refer to <a title="Product Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a> and <a title="Media  &amp; IT Equipment Management, Decommissioning and Disposal" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14678">Chapter 13 – Media &amp; IT Equipment Management, Decommissioning and Disposa</a>l for additional guidance.</p>]]></paragraph>
<paragraph
    title="12.6.10.C.01."

    tags="Technical,Disposal,Product Sanitisation,Product Security"


    classification="All Classifications"
    compliance="Must"
    cid="6997"
><![CDATA[<p>Because of the risks that data can be recovered from monitors, it is essential that any redeployment or disposal of monitors MUST follow the guidance in the NZISM.</p>]]></paragraph>
</block>
</subsection>
</section>
