<section title="13.4. Media and IT Equipment Sanitisation"><subsection title="Objective"><paragraph
    title="13.4.1."


><![CDATA[<p>Media and IT Equipment that is to be redeployed or is no longer required is sanitised.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="13.4.2."


><![CDATA[<p>This section covers information relating to sanitising media and IT Equipment. Further information relating to sanitising IT equipment can be found in <a title="Product sanitisation and disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14585">Section 12.6 - Product Sanitisation and Disposal</a>.</p>]]></paragraph>
</block>
<block title="Definition"><paragraph
    title="13.4.3."


><![CDATA[<p>Sanitisation is defined as the process of removal of data and information from the storage device such that data recovery using any known technique or analysis is prevented or made unfeasible. The process includes the removal of all useful data from the storage device, including metadata, as well as the removal of all labels, markings, classifications and activity logs. Methods vary depending upon the nature, technology used and construction of the storage device or equipment and may include degaussing, incineration, shredding, grinding, knurling or embossing and chemical immersion.</p>]]></paragraph>
</block>
<block title="Sanitising media and IT Equipment "><paragraph
    title="13.4.4."


><![CDATA[<p>The process of sanitisation does not automatically change the classification of the media or IT Equipment, nor does sanitisation necessarily involve the destruction of media or IT Equipment.</p>]]></paragraph>
</block>
<block title="Product selection"><paragraph
    title="13.4.5."


><![CDATA[<p>Agencies are permitted to use non-evaluated products to sanitise media and IT Equipment. However, the product will still need to meet the specifications and achieve the requirements for sanitising media and IT Equipment as outlined in this section.</p>]]></paragraph>
</block>
<block title="Hybrid hard drives, Solid State Drives and Flash Memory Devices"><paragraph
    title="13.4.6."


><![CDATA[<p>Hybrid hard drives, solid state drives and flash memory devices are difficult or impossible to sanitise effectively. In most cases safe disposal will require destruction, this includes any equipment with integrated memory capability. The sanitisation and post sanitisation treatment requirements for redeployment of such devices should be carefully observed.</p>]]></paragraph>
</block>
<block title="New Zealand Eyes Only (NZEO) Materials"><paragraph
    title="13.4.7."


><![CDATA[<p>NZEO endorsed material requires additional protection at every level of classification. In general terms, media and IT Equipment containing NZEO material should be sanitised and redeployed or sanitised and destroyed in accordance with the procedures in this section. Media and IT Equipment that has contained NZEO material must not be disposed of to e-recyclers or sold to any third party.</p>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="13.4.8."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td>
<p><strong>Reference</strong></p>
</td>
<td>
<p><strong>Title</strong></p>
</td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Data Remanence in Semiconductor Devices</strong></p>
</td>
<td>
<p>Peter Gutmann</p>
<p>IBM T.J.Watson Research Center</p>
</td>
<td style="width: 33%;">http://www.cypherpunks.to/~peter/usenix01.pdf</td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>RAM testing tool memtest86+</strong></p>
</td>
<td>&nbsp;</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.memtest.org/" target="_blank">https://www.memtest.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>MemtestG80 and MemtestCL: Memory Testers for CUDA- and OpenCL-enabled GPUs</strong></p>
</td>
<td>
<p>Simbios project funded by the National Institutes of Health</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://simtk.org/home/memtest" target="_blank">https://simtk.org/home/memtest</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>HDDerase </strong></p>
<p><strong>Capable of calling the ATA secure erase command for non-volatile magnetic hard disks. It is also capable of resetting host protected area and device configuration overlay table information on the media.</strong></p>
</td>
<td>
<p>A freeware tool developed by the Center for Magnetic Recording Research at the University of California San Diego.</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://cmrr.ucsd.edu/resources/secure-erase.html?_ga=2.231749531.545206853.1522881172-221519987.1522881172" target="_blank">https://cmrr.ucsd.edu/resources/secure-erase.html?_ga=2.231749531.545206853.1522881172-221519987.1522881172</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>AISEP Evaluated Products List (EPL)</strong></p>
</td>
<td>
<p>Australasian Information Security Evaluation Program</p>
</td>
<td style="width: 33%;"><a title="EPL" rel="noopener noreferrer" href="https://www.cyber.gov.au/acsc/view-all-content/epl-products" target="_blank">https://www.cyber.gov.au/acsc/view-all-content/epl-products</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>ATA Secure Erase</strong></p>
</td>
<td>
<p>ATA ANSI specifications</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ansi.org/" target="_blank">https://www.ansi.org/</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td><strong>Secure sanitisation of storage media</strong></td>
<td>
<p>NCSC, UK</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media" target="_blank">https://www.ncsc.gov.uk/guidance/secure-sanitisation-storage-media</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>Reliably Erasing Data From Flash-Based Solid State Drives</strong></p>
</td>
<td>
<p>Wei, Grupp, Spada and Swanson Department of Computer Science and Engineering, University of California, San Diego</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf" target="_blank">https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf [PDF, 1.96 MB]</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1110&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1110&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>2010 Zombie Hard disks - Data from the Living Dead</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1085&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1085&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market</strong></p>
</td>
<td>
<p>Edith Cowan University Research Online. Australian Digital Forensics Conference</p>
</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1079&amp;context=adf" target="_blank">https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1079&amp;context=adf</a></td>
</tr>
<tr>
<td>&nbsp;</td>
<td>
<p><strong>NSA/CSS Storage Device Declassification Manual December 2007</strong></p>
</td>
<td>NSA</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.nsa.gov/portals/75/documents/resources/everyone/Media-destruction/storage-device-declassification-manual.pdf" target="_blank">https://www.nsa.gov/portals/75/documents/resources/everyone/Media-destruction/storage-device-declassification-manual.pdf [PDF, 157 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Sanitisation procedures"><paragraph
    title="13.4.9.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Sanitising media and IT Equipment prior to reuse or redeployment in a different environment ensures that classified information is not inadvertently accessed by an unauthorised individual or inadequately protected.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Using approved sanitisation methods provides a high level of assurance that no remnant data is on the media and IT Equipment.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.03."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The procedures used in the NZISM are designed not only to prevent common attacks that are currently feasible, but also to protect from threats that could emerge in the future.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.04."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>When sanitising media, it is necessary to read back the contents of the media to verify that the overwrite process completed successfully.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.05."

    tags="Technical,Media Destruction,Media Management,Media Sanitisation"


><![CDATA[<p>If the sanitising process cannot be successfully completed, destruction will be necessary.</p>]]></paragraph>
<paragraph
    title="13.4.9.R.06."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>It is important to note that "factory reset" or similar terms <strong>do not</strong> constitute sanitisation of media.</p>]]></paragraph>
<paragraph
    title="13.4.9.C.01."

    tags="Information Security Documentation,Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4169"
><![CDATA[<p>Agencies MUST document conditions and procedures for the sanitisation of media and IT Equipment.</p>]]></paragraph>
</block>
<block title="Media that cannot be sanitised"><paragraph
    title="13.4.10.R.01."

    tags="Technical,Media Destruction,Media Management,Media Sanitisation"


><![CDATA[<p>Some types of media cannot be sanitised and therefore MUST be destroyed. It is not possible to use these types of media while maintaining a high level of assurance that no previous data can be recovered.</p>]]></paragraph>
<paragraph
    title="13.4.10.C.01."

    tags="Technical,Media Destruction,Media Disposal,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4176"
><![CDATA[<p>Agencies MUST destroy the following media types <span style="text-decoration: underline;"><strong>prior to</strong> <strong>disposal</strong></span>, as they cannot be effectively sanitised:</p><ul>
<li>microfiche;</li>
<li>microfilm;</li>
<li>optical discs;</li>
<li>printer ribbons and the impact surface facing the platen;</li>
<li>programmable read-only memory (PROM, EPROM, EEPROM);</li>
<li>flash memory and solid state or hybrid data storage devices;</li>
<li>read-only memory; and</li>
<li>faulty magnetic media that cannot be successfully sanitised.</li>
</ul><p> </p>]]></paragraph>
</block>
<block title="Volatile media sanitisation"><paragraph
    title="13.4.11.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>When sanitising volatile media, the specified time to wait following removal of power is based on applying a safety factor to research on recovering the contents of volatile media.</p>]]></paragraph>
<paragraph
    title="13.4.11.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4181"
><![CDATA[<p>Agencies MUST sanitise volatile media by:</p><ul>
<li>overwriting all locations of the media with an arbitrary pattern;</li>
<li>followed by a read back for verification; and</li>
<li>removing power from the media for at least 10 minutes.</li>
</ul>]]></paragraph>
</block>
<block title="Treatment of volatile media following sanitisation"><paragraph
    title="13.4.12.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>There is published literature that supports the existence of short-term data remanence effects in volatile media. Data retention time is reported to range from minutes (at normal room temperatures) to hours (in extreme cold), depending on the temperature of the volatile media. Further, published literature has shown that some volatile media can suffer from long-term data remanence effects resulting from physical changes to the media due to continuous storage of static data for an extended period of time. It is for these reasons that TOP SECRET volatile media MUST always remain at this classification, even after sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.12.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4184"
><![CDATA[<p>Following sanitisation, volatile media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p><strong>Pre-sanitisation classification / Endorsement</strong></p>
</td>
<td>
<p><strong>Post-sanitisation classification / Endorsement</strong></p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>
<p>NZEO</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>SECRET</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>
<p>RESTRICTED and all lower classifications</p>
</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile magnetic media sanitisation"><paragraph
    title="13.4.13.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Both the host protected area and device configuration overlay table of non-volatile magnetic hard disks are normally not visible to the operating system or the computer’s BIOS. Hence any sanitisation of the readable sectors on the media will not overwrite these hidden sectors leaving any classified information contained in these locations untouched. Some sanitisation programs include the ability to reset devices to their default state removing any host protected areas or device configuration overlays. This allows the sanitisation program to see the entire contents of the media during the subsequent sanitisation process.</p>]]></paragraph>
<paragraph
    title="13.4.13.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Modern non-volatile magnetic hard disks automatically reallocate space for bad sectors at a hardware level. These bad sectors are maintained in what is known as the growth defects table or ‘g-list’. If classified information was stored in a sector that is subsequently added to the g-list, sanitising the media will not overwrite these non-addressable bad sectors, and remnant data will exist in these locations. Whilst these sectors may be considered bad by the device quite often this is due to the sectors no longer meeting expected performance norms for the device and not due to an inability to read/write to the sector.</p>]]></paragraph>
<paragraph
    title="13.4.13.R.03."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The ATA secure erase command is built into the firmware of post-2001 devices and is able to access sectors that have been added to the g-list. Modern non-volatile magnetic hard disks also contain a primary defects table or ‘p-list’. The p-list contains a list of bad sectors found during post-production processes. No information is ever stored in sectors on the p-list for a device as they are inaccessible before the media is used for the first time.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4189"
><![CDATA[<p>Agencies MUST sanitise non-volatile magnetic media by:</p><ul>
<li>if pre-2001 or under 15GB: overwriting the media at least three times in its entirety with an arbitrary pattern followed by a read back for verification; or</li>
<li>if post-2001 or over 15GB: overwriting the media at least once in its entirety with an arbitrary pattern followed by a read back for verification.</li>
</ul>]]></paragraph>
<paragraph
    title="13.4.13.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4190"
><![CDATA[<p>Agencies MUST boot from separate media to the media being sanitised when undertaking sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.03."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4191"
><![CDATA[<p>Agencies SHOULD reset the host protected area and drive configuration overlay table of non-volatile magnetic hard disks prior to overwriting the media.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.04."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4192"
><![CDATA[<p>Agencies SHOULD attempt to overwrite the growth defects table (g-list) on non-volatile magnetic hard disks.</p>]]></paragraph>
<paragraph
    title="13.4.13.C.05."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4193"
><![CDATA[<p>Agencies SHOULD use the ATA security erase command for sanitising non-volatile magnetic hard disks instead of using block overwriting software.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile magnetic media following sanitisation"><paragraph
    title="13.4.14.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Highly classified non-volatile magnetic media cannot be sanitised below its original classification because of concerns with the sanitisation of the host protected area, device configuration overlay table and growth defects table.</p>]]></paragraph>
<paragraph
    title="13.4.14.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4200"
><![CDATA[<p>Following sanitisation, non-volatile magnetic media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>
<p>NZEO</p>
</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>
<p>SECRET</p>
</td>
<td>
<p>SECRET</p>
</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>
<p>RESTRICTED</p>
</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile EPROM media sanitisation"><paragraph
    title="13.4.15.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>When erasing non-volatile EPROM, the manufacturer’s specified ultraviolet erasure time is multiplied by a factor of three to provide an additional level of certainty in the process. Verification is provided by read-back.</p>]]></paragraph>
<paragraph
    title="13.4.15.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4205"
><![CDATA[<p>Agencies MUST sanitise non-volatile EPROM media by erasing as per the manufacturer’s specification, increasing the specified ultraviolet erasure time by a factor of three, then overwriting the media at least once in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Non-volatile EEPROM media sanitisation"><paragraph
    title="13.4.16.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>A single overwrite with a pseudo random pattern is considered good practice for sanitising non-volatile EEPROM media.</p>]]></paragraph>
<paragraph
    title="13.4.16.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4208"
><![CDATA[<p>Agencies MUST sanitise non-volatile EEPROM media by overwriting the media at least once in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile EPROM and EEPROM media following sanitisation"><paragraph
    title="13.4.17.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>As little research has been conducted on the ability to recover data on non-volatile EPROM or EEPROM media after sanitisation, highly classified media retains its original classification.</p>]]></paragraph>
<paragraph
    title="13.4.17.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4212"
><![CDATA[<p>Following sanitisation, non-volatile EPROM and EEPROM media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>NZEO</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>SECRET</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>UNCLASSIFIED</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
</block>
<block title="Non-volatile flash memory &amp; FPGA  media sanitisation"><paragraph
    title="13.4.18.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Wear levelling ensures that writes are distributed evenly across each memory block in flash memory. Where possible flash memory SHOULD be overwritten with a pseudo random pattern twice, rather than once, as this helps to ensure that all memory blocks are overwritten during sanitisation. Verification is provided by read-back.</p>]]></paragraph>
<paragraph
    title="13.4.18.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4215"
><![CDATA[<p>Agencies MUST sanitise non-volatile flash memory media by overwriting the media at least twice in its entirety with a pseudo random pattern, followed by a read back for verification.</p>]]></paragraph>
</block>
<block title="Treatment of non-volatile flash memory &amp; FPCA media following sanitisation"><paragraph
    title="13.4.19.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>The following guidance applies in cases where media is to be redeployed. </p><p>Owing to the use of wear levelling in flash memory, it is possible that not all physical memory locations are written to when attempting to overwrite the media. Classified information can therefore remain on the media. It is for these reasons that TOP SECRET, SECRET and CONFIDENTIAL flash memory media MUST always remain at their respective classification, even after sanitisation.</p>]]></paragraph>
<paragraph
    title="13.4.19.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Non-volatile flash memory may be redeployed within systems of the same classification only after <span style="text-decoration: underline;"><strong>all</strong></span> manufacturer's sanitation procedures have been followed. Destruction and Disposal are covered in sections <a title="Media and IT equipment destruction" href="http://nzism.gcsb.govt.nz/ism-document#Section-14890">13.5 - Media and IT equipment destruction</a> and <a title="Media and IT equipment disposal" href="http://nzism.gcsb.govt.nz/ism-document#Section-14964">13.6 - Media and IT equipment Disposal</a> respectively.</p>]]></paragraph>
<paragraph
    title="13.4.19.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4218"
><![CDATA[<p>Following sanitisation, non-volatile flash memory media MUST be treated as indicated in the table below.</p><table class="table-secondary">
<tbody>
<tr>
<td>
<p>Pre-sanitisation classification</p>
</td>
<td>
<p>Post-sanitisation classification</p>
</td>
</tr>
<tr>
<td>
<p>New Zealand Eyes Only (NZEO) Endorsement</p>
</td>
<td>NZEO</td>
</tr>
<tr>
<td>
<p>TOP SECRET</p>
</td>
<td>
<p>TOP SECRET</p>
</td>
</tr>
<tr>
<td>SECRET</td>
<td>SECRET</td>
</tr>
<tr>
<td>CONFIDENTIAL</td>
<td>CONFIDENTIAL</td>
</tr>
<tr>
<td>RESTRICTED</td>
<td>UNCLASSIFIED</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="13.4.19.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="5426"
><![CDATA[<p>Where manufacturer sanitation procedures cannot be determined, items MUST be destroyed.</p>]]></paragraph>
</block>
<block title="Sanitising solid state drives"><paragraph
    title="13.4.20.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Solid state drives operate a Flash Translation Layer (FTL) to interface with the storage devices – usually NAND chips. Current sanitation techniques address the FTL, rather than destroying the underlying data. It is possible to bypass the FTL, thus accessing the underlying data. With current technology, there is no effective means of sanitising solid state drives.</p>]]></paragraph>
<paragraph
    title="13.4.20.R.02."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Solid state drives also use wear equalisation or levelling techniques which can leave data remnants.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4222"
><![CDATA[<p>Solid state drives MUST be destroyed before disposal.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.02."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4223"
><![CDATA[<p>Solid state drives MUST be sanitised using ATA Secure Erase sanitation software before redeployment.</p>]]></paragraph>
<paragraph
    title="13.4.20.C.03."

    tags="Technical,Media Management,Media Sanitisation"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="4224"
><![CDATA[<p>Solid state drives MUST NOT be redeployed in a lower classification environment.</p>]]></paragraph>
</block>
<block title="Hybrid Drives"><paragraph
    title="13.4.21.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Hybrid drives combine solid state memory devices with magnetic disk technologies. As such they are subject to the same difficulties in effective sanitisation as solid state devices.</p>]]></paragraph>
<paragraph
    title="13.4.21.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Must"
    cid="4227"
><![CDATA[<p>Hybrid drives MUST be treated as solid state drives for sanitisation purposes.</p>]]></paragraph>
</block>
<block title="Sanitising media and IT Equipment  prior to reuse"><paragraph
    title="13.4.22.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Sanitising media and IT Equipment prior to reuse at the same or higher classification assists with enforcing the need-to-know principle within the agency. This includes any material with an NZEO endorsement.</p>]]></paragraph>
<paragraph
    title="13.4.22.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4230"
><![CDATA[<p>Agencies SHOULD sanitise all media and IT Equipment prior to reuse at the same or higher classification.</p>]]></paragraph>
</block>
<block title="Verifying sanitised media and IT Equipment "><paragraph
    title="13.4.23.R.01."

    tags="Technical,Media Management,Media Sanitisation"


><![CDATA[<p>Verifying the sanitisation of media and IT Equipment with a different product to the one conducting the sanitisation process provides an independent level of assurance that the sanitisation process was conducted correctly.</p>]]></paragraph>
<paragraph
    title="13.4.23.C.01."

    tags="Technical,Media Management,Media Sanitisation"


    classification="All Classifications"
    compliance="Should"
    cid="4234"
><![CDATA[<p>Agencies SHOULD verify the sanitisation of media and IT Equipment using a different product from the one used to perform the initial sanitisation.</p>]]></paragraph>
</block>
</subsection>
</section>
