Foreword |
|
xv | |
Introduction |
|
xix | |
|
Chapter 1 End of Life for Data |
|
|
1 | (14) |
|
|
3 | (1) |
|
|
4 | (2) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (3) |
|
|
7 | (1) |
|
|
7 | (2) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.10 Ecological and Economic Considerations |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
1.11 Summary: Proactive Risk Reduction and Reactive End of Life |
|
|
14 | (1) |
|
Chapter 2 Where Are We, and How Did We Get Here? |
|
|
15 | (8) |
|
|
16 | (1) |
|
2.2 Erasing Magnetic Media |
|
|
17 | (1) |
|
2.3 History of Data Erasure |
|
|
17 | (4) |
|
2.3.1 The Beginnings of Commercial Data Erasure |
|
|
19 | (1) |
|
2.3.2 Darik's Boot and Nuke (DBAN) |
|
|
19 | (2) |
|
|
21 | (2) |
|
Chapter 3 Data Sanitization Technology |
|
|
23 | (10) |
|
|
24 | (1) |
|
|
24 | (1) |
|
|
25 | (2) |
|
|
27 | (1) |
|
3.5 Erasing Solid-State Drives |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
|
31 | (2) |
|
Chapter 4 Information Lifecycle Management |
|
|
33 | (8) |
|
4.1 Information Lifecycle Management vs. Data Lifecycle Management |
|
|
33 | (1) |
|
4.2 Information Lifecycle Management |
|
|
34 | (1) |
|
|
34 | (1) |
|
4.3 Data Security Lifecycle |
|
|
35 | (1) |
|
4.3.1 Stages for Data Security Lifecycle |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
4.5.1 Physical Destruction |
|
|
37 | (1) |
|
4.5.2 Cryptographic Erasure |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (2) |
|
Chapter 5 Regulatory Requirements |
|
|
41 | (26) |
|
|
42 | (1) |
|
5.1.1 NIST Cybersecurity Framework Applied to Data |
|
|
42 | (1) |
|
|
43 | (19) |
|
|
44 | (1) |
|
5.2.1.1 The Right to Erasure |
|
|
45 | (6) |
|
|
51 | (2) |
|
5.2.2 FflPAA Security Rule Subpart C |
|
|
53 | (3) |
|
5.2.3 PCI DSSV3.2 Payment Card Industry Requirements |
|
|
56 | (2) |
|
|
58 | (1) |
|
5.2.5 Saudi Arabian Monetary Authority Payment Services Regulations |
|
|
59 | (1) |
|
5.2.6 New York State Cybersecurity Requirements of Financial Services Companies 23 NYCRR 500 |
|
|
59 | (1) |
|
5.2.7 Philippines Data Privacy Act 2012 |
|
|
60 | (1) |
|
5.2.8 Singapore Personal Data Protection Act 2012 |
|
|
61 | (1) |
|
5.2.9 Gramm-Leach-Bliley Act |
|
|
61 | (1) |
|
|
62 | (3) |
|
5.3.1 ISO 27000 and Family |
|
|
62 | (1) |
|
|
63 | (2) |
|
|
65 | (2) |
|
|
67 | (6) |
|
6.1 IEEE P2883 Draft Standard for Sanitizing Storage |
|
|
68 | (2) |
|
|
68 | (1) |
|
6.1.2 Storage Sanitization |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
6.2 Updated ISO/IEC CD 27040 Information Technology Security Techniques---Storage Security |
|
|
70 | (1) |
|
|
71 | (2) |
|
Chapter 7 Asset Lifecycle Management |
|
|
73 | (14) |
|
7.1 Data Sanitization Program |
|
|
73 | (1) |
|
|
74 | (2) |
|
7.3 Servers and Network Gear |
|
|
76 | (3) |
|
|
78 | (1) |
|
|
79 | (3) |
|
|
80 | (1) |
|
7.4.2 Mobile Phone Processing |
|
|
80 | (1) |
|
7.4.3 Enterprise Data Erasure for Mobile Devices |
|
|
81 | (1) |
|
7.4.3.1 Bring Your Own Device |
|
|
81 | (1) |
|
7.4.3.2 Corporate-Issued Devices |
|
|
81 | (1) |
|
7.5 Internet of Things: Unconventional Computing Devices |
|
|
82 | (1) |
|
7.5.1 Printers and Scanners |
|
|
82 | (1) |
|
|
82 | (1) |
|
7.5.3 Industrial Control Systems |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
83 | (1) |
|
|
83 | (3) |
|
|
84 | (1) |
|
7.6.2 Used Vehicle Market |
|
|
85 | (1) |
|
7.6.3 Sanitization of Automobiles |
|
|
85 | (1) |
|
|
86 | (1) |
|
Chapter 8 Asset Disposition |
|
|
87 | (10) |
|
8.1 Contracting and Managing Your ITAD |
|
|
88 | (1) |
|
|
89 | (2) |
|
8.3 Sustainability and Green Tech |
|
|
91 | (1) |
|
|
91 | (1) |
|
8.4.1 Tracking Throughput |
|
|
91 | (1) |
|
|
92 | (1) |
|
8.5 e-Stewards Standard for Responsible Recycling and Reuse of Electronic Equipment |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
Chapter 9 Stories from the Field |
|
|
97 | (12) |
|
|
98 | (3) |
|
9.2 TES--IT Lifecycle Solutions |
|
|
101 | (3) |
|
9.2.1 Scale of Operations |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
104 | (2) |
|
|
106 | (3) |
|
Chapter 10 Data Center Operations |
|
|
109 | (4) |
|
10.1 Return Material Allowances |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
10.4 Rack-Mounted Hard Drives |
|
|
111 | (1) |
|
|
112 | (1) |
|
Chapter 11 Sanitizing Files |
|
|
113 | (4) |
|
11.1 Avoid Confusion with CDR |
|
|
113 | (1) |
|
|
114 | (1) |
|
11.3 When to Sanitize Files |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
Chapter 12 Cloud Data Sanitization |
|
|
117 | (6) |
|
12.1 User Responsibility vs. Cloud Provider Responsibility |
|
|
117 | (2) |
|
12.2 Attacks Against Cloud Data |
|
|
119 | (1) |
|
|
119 | (1) |
|
12.4 Data Sanitization for the Cloud |
|
|
120 | (1) |
|
|
121 | (2) |
|
Chapter 13 Data Sanitization and Information Lifecycle Management |
|
|
123 | (4) |
|
13.1 The Data Sanitization Team |
|
|
124 | (1) |
|
|
124 | (1) |
|
13.3 Data Sanitization Policy |
|
|
124 | (2) |
|
|
125 | (1) |
|
13.3.2 Working with DevOps |
|
|
125 | (1) |
|
13.3.3 Working with Data Security |
|
|
125 | (1) |
|
13.3.4 Working with the Legal Team |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
126 | (1) |
|
Chapter 14 How Not to Destroy Data |
|
|
127 | (4) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
14.2 Acids and Other Solvents |
|
|
128 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (1) |
|
14.6 Ice Shaving Machines |
|
|
129 | (2) |
|
Chapter 15 The Future of Data Sanitization |
|
|
131 | (8) |
|
15.1 Advances in Solid-State Drives |
|
|
132 | (1) |
|
15.2 Shingled Magnetic Recording |
|
|
133 | (1) |
|
15.3 Thermally Assisted Magnetic Recording, Also Known as Heat-Assisted Magnetic Recording |
|
|
133 | (1) |
|
15.4 Microwave-Assisted Magnetic Recording |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
|
139 | (4) |
|
Appendix Enterprise Data Sanitization Policy |
|
|
143 | (16) |
|
|
143 | (1) |
|
|
143 | (1) |
|
|
144 | (1) |
|
General Data Hygiene and Data Retention |
|
|
144 | (1) |
|
|
144 | (1) |
|
Handling Files Classified as Confidential |
|
|
144 | (1) |
|
|
144 | (1) |
|
End of Life for Classified Virtual Machines |
|
|
145 | (1) |
|
|
145 | (1) |
|
Seven Steps to Creating a Data Sanitization Process |
|
|
145 | (2) |
|
Step 1 Prioritize and Scope |
|
|
146 | (1) |
|
|
146 | (1) |
|
Step 3 Create a Current Profile |
|
|
146 | (1) |
|
Step 4 Conduct a Risk Assessment |
|
|
147 | (1) |
|
Step 5 Create a Target Profile |
|
|
147 | (1) |
|
Step 6 Determine, Analyze, and Prioritize Gaps |
|
|
147 | (1) |
|
Step 7 Implement Action Plan |
|
|
147 | (1) |
|
Data Sanitization Defined |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Pros and Cons of Physical Destruction |
|
|
148 | (1) |
|
Cryptographic Erasure (Crypto-Erase) |
|
|
148 | (1) |
|
Pros and Cons of Cryptographic Erasure |
|
|
149 | (1) |
|
|
149 | (1) |
|
Pros and Cons of Data Erasure |
|
|
150 | (1) |
|
|
150 | (1) |
|
Asset Lifecycle Procedures |
|
|
151 | (1) |
|
Suggested Process, In Short |
|
|
152 | (1) |
|
Create Contract Language for Third Parties |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
Validation of Data Erasure Software and Equipment |
|
|
153 | (1) |
|
|
153 | (1) |
|
Servers and Server Storage Systems |
|
|
154 | (1) |
|
Photocopiers, Network Printers, and Fax Machines |
|
|
154 | (1) |
|
Mobile Phones, Smartphones, and Tablets |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (1) |
|
Removable Solid-State Memory Devices (USB Flash Drives, SD Cards) |
|
|
155 | (1) |
|
CDs, DVDs, and Optical Discs |
|
|
155 | (1) |
|
|
155 | (1) |
|
General Requirements for Full Implementation |
|
|
155 | (1) |
|
Procedure for Partners and Suppliers |
|
|
155 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
Roles and Responsibilities |
|
|
157 | (1) |
|
|
157 | (1) |
|
|
157 | (2) |
Index |
|
159 | |