cryptoshred

Secure Erase and Release of Solid-State Drives

Overview

Solid-state drives (SSDs), otherwise known as “flash” storage, differ from hard-disk drives (HDDs) in the way that they store and handle data. It’s important to understand the differences between these two technologies in order for SSDs to be repurposed and/or disposed of securely. This KB article will consider these differences and explain the procedure involved to securely erase the contents of an SSD.

Solid-State Drive Differences

With traditional HDDs, disk removal utilities, such as DBAN, can be used to securely wipe a drive. This process involves overwriting the contents of a hard drive with random bits of data so that the original data cannot be easily recovered. When this process is repeated multiple times, the likelihood of recovering the data on the drive is reduced significantly.

Overwriting the contents of an SSD is neither secure nor efficient due to the following technologies:

Methods to Securely Erase a Solid-State Drive

The following methods can be used to securely erase a solid state drive:

Deciding What Action to Take

Depending on the configuration, previous contents, and the final destination of the SSD, the technician handling the request must use proper judgement in deciding what series of actions to take. The below workflow can be used to aid in making a decision. Please refer to Oakland University policy 860 Data Management and Information Security for data classification definitions:

Instructions to Create and Operate Cryptoshred Tool

Create Cryptoshred Tool

Operate Cryptoshred Tool

Best Practices

Use the following best practices when provisioning SSDs to members of the campus community:

Additional Considerations

Many new laptops and desktops ship with SSDs installed, but all mobile devices (e.g. phones, tablets, etc.) leverage SSD storage. Before repurposing within the University or releasing to the public, please leverage the native tools within the mobile device OS to reset devices to its factory default configuration. Use the decision matrix in the previous section to determine if a mobile device should be released to the public or destroyed.

Multi-function devices (MFDs), such as printers and scanners, also leverage SSD technology and therefore must adhere to these guidelines. Any MFDs that are managed through a vendor agreement must be returned to UTS upon decommissioning. For all other MFDs, please ensure the device is securely destroyed.

Please contact uts@oakland.edu with any additional questions or concerns.

References

last edited 2024-03-07 12:05:25 by weng2