4.2 Explain the security implications of proper hardware, software, and data asset management
Role of asset management in organizations.
Necessity for data destruction in certain circumstances.
Importance of ensuring security through compliance and resource management.
Data Retention and Destruction
Organizations must destroy data post-retention period.
Compliance with internal policies and external regulations is critical.
Objectives of data destruction:
Security
Compliance
Optimization of storage resources
Importance of Secure Data Destruction
Compliance with legal and regulatory bodies:
General Data Protection Regulation (GDPR)
Health Insurance Portability and Accountability Act (HIPAA)
Obligation to delete or destroy data once it is no longer needed or upon request from the data subject.
Periodic destruction of outdated data:
Maintains efficient storage utilization.
Reduces risk of data breaches.
Decommissioning of Storage Devices
Critical steps to ensure data destruction before disposal or repurposing.
Specific methods should align with the type of storage media being decommissioned:
Hard Disk Drives (HDDs):
Effective data wiping methods:
Overwriting data with zeros.
Multiple passes of various patterns to thwart data recovery attempts.
Solid-State Drives (SSDs):
Traditional overwriting methods are ineffective due to:
Wear leveling
Bad block management.
Recommended method: ATA Secure Erase
Command directs the drive’s firmware to sanitize all stored data, including inaccessible marked-as-bad memory cells.
Asset Disposal and Decommissioning Concepts
Focus: Secure and compliant handling of data & storage devices at the end of their lifecycle.
Key Concepts:
Sanitization:
Definition: The process of removing sensitive information to prevent unauthorized access/data breaches.
Techniques:
Data wiping
Degaussing
Encryption
Importance in compliance with data protection regulations when repurposing/donating devices.
Destruction:
Definition: The physical or electronic elimination of information to render it inaccessible and irrecoverable.
Methods:
Physical destruction:
Shredding
Crushing
Incineration
Electronic destruction:
Overwriting data multiple times
Degaussing to eliminate magnetic fields.
Significance in ensuring data cannot be recovered or misused post-disposal.
Certification:
Definition: Documentation and verification of the sanitization/destruction process.
Involvement of third-party providers:
Obtain a certificate of destruction/sanitization.
Benefits of certification:
Evidence of compliance with data protection regulations.
Reduces risk of legal liabilities.
Challenges in Certification
Difficulty in certifying data destruction without third-party involvement.
Offers impartial evaluation and assurance of proper procedures being followed.
Data Wiping Methods and Software
Active KillDisk software is an example of data wiping technology.
Understanding of HDD data deletion:
Data on magnetic-type HDDs is not fully erased; only marked as available for writing.
Standard tools (e.g., Windows format) remove file references but do not erase the data.
Overwriting Techniques for HDDs
Standard method of sanitizing an HDD is overwriting.
Types of Overwriting:
Zero Filling:
Basic method where each bit is set to zero.
Secure Method:
Overwrite with:
One pass of all zeros.
One pass of all ones.
One pass in a pseudorandom pattern.
Historical context:
Some federal requirements stipulated a “three pass rule” per DoD manual.
Transition to NIST SP 800-88 for media sanitization guidelines.
Time consideration: Overwriting can take considerable time based on the number of passes required.