Objective 4.2Medium11 min

Disposal and Decommissioning

Secure disposal methods including sanitization, destruction, and certification for end-of-life assets. Understanding NIST 800-88 media sanitization standards and compliance requirements.

Understanding Disposal and Decommissioning

Disposal and decommissioning ensures data is irrecoverable when assets reach end of life. Improper disposal has caused major breaches—discarded drives with recoverable data regularly appear in second-hand markets.

Key disposal concepts:Sanitization — Remove data from media • Destruction — Physically destroy media • Certification — Document proper disposal • Compliance — Meet regulatory requirements

In 2019, Morgan Stanley was fined $60 million after decommissioning data center equipment without proper sanitization. Old servers containing customer PII were sold at auction with data still recoverable. The bank outsourced disposal but remained legally responsible.

Data must be irrecoverable before assets leave your control.

Why This Matters for the Exam

Disposal and decommissioning is tested on SY0-701 because improper disposal causes breaches. Questions cover sanitization methods, destruction techniques, and when to use each.

Understanding disposal helps with data protection, compliance, and risk management. Data on disposed assets is a common breach source.

The exam tests recognition of sanitization methods and appropriate selection.

Deep Dive

What Is Media Sanitization?

Sanitization removes data from media so it cannot be recovered.

NIST 800-88 Sanitization Levels:

LevelMethodRecoveryUse Case
ClearOverwriteDifficultReuse internally
PurgeEnhanced clearInfeasibleReuse externally
DestroyPhysicalImpossibleSensitive data

Clear:

Method: Overwrite with zeros/patterns
Recovery: Difficult but theoretically possible
Suitable for: Internal reuse, low sensitivity

Examples:
- Single-pass overwrite
- Format with overwrite
- Factory reset with overwrite

Purge:

Method: Multiple overwrites or crypto-erase
Recovery: Infeasible with current technology
Suitable for: External reuse, moderate sensitivity

Examples:
- Block erase on SSD
- Cryptographic erase
- Degaussing (for HDD)
- Multiple overwrite passes

Destroy:

Method: Physical destruction
Recovery: Impossible
Suitable for: Highly sensitive, no reuse

Examples:
- Shredding
- Disintegration
- Incineration
- Pulverization

What Are Specific Sanitization Methods?

Overwriting:

Process: Write data patterns over existing data
Passes: Single or multiple
Tools: DBAN, vendor utilities

Pros:
- Media can be reused
- Relatively fast
- No special equipment

Cons:
- May not reach all areas (bad sectors)
- Not effective for SSDs (wear leveling)
- Time-consuming for large drives

Degaussing:

Process: Powerful magnetic field destroys data
Targets: Magnetic media (HDD, tape)
Result: Media usually destroyed

Pros:
- Fast
- Effective for magnetic media
- Irreversible

Cons:
- Destroys the media
- Doesn't work on SSDs
- Requires degausser equipment

Cryptographic Erase:

Process: Delete encryption key, data unreadable
Requirement: Media must be encrypted
Result: Data irrecoverable without key

Pros:
- Very fast
- Media reusable
- Works on SSDs

Cons:
- Requires encryption was enabled
- Relies on proper key destruction
- Implementation-dependent

Physical Destruction:

Methods:
- Shredding: Cut into small pieces
- Pulverizing: Grind to powder
- Disintegrating: Reduce to particles
- Incineration: Burn at high temperature

When to use:
- Highest sensitivity data
- Compliance requirements
- Cannot verify sanitization
- Media cannot be sanitized (damaged)

What About SSDs and Flash Media?

SSDs require different approaches than HDDs.

SSD Challenges:

ChallengeImpact
Wear levelingData spread across chips
Over-provisioningHidden capacity
Bad block managementData in inaccessible areas
Trim not guaranteedDeleted data may persist

SSD Sanitization Options:

MethodEffectiveness
OverwriteUnreliable (wear leveling)
Crypto eraseEffective if encrypted
Block eraseEffective (vendor command)
Physical destructionMost reliable

SSD Best Practice:

For reuse:
- Crypto erase (if encrypted)
- Vendor secure erase command

For disposal:
- Physical destruction
- Shred to small particle size

What Documentation Is Required?

Certificate of Destruction:

Must include:
- Asset identification (serial numbers)
- Sanitization method used
- Date of sanitization
- Personnel performing sanitization
- Witness signature (if required)
- Verification method
- Disposal method for media

Chain of Custody:

Track from:
1. Decommissioning decision
2. Data backup/migration
3. Transport to sanitization
4. Sanitization performed
5. Verification completed
6. Final disposal/recycling
7. Certificate issued

What Is the Decommissioning Process?

Decommissioning Steps:

StepActivities
1. PlanIdentify data, backup needs, timeline
2. BackupMigrate needed data
3. RevokeRemove access, certificates
4. SanitizeApply appropriate method
5. VerifyConfirm sanitization
6. DocumentCertificate of destruction
7. DisposeRecycle or destroy
8. UpdateRemove from inventory

How CompTIA Tests This

Example Analysis

Scenario: A bank is decommissioning 500 workstations, 50 servers, and 200 backup tapes. The equipment contains customer financial data (PII). Design a disposal strategy.

Analysis - Financial Data Disposal:

Data Classification:

Customer financial data:
- PII (names, SSN, account numbers)
- Regulatory: GLBA, PCI-DSS
- Classification: Restricted/Highly Sensitive
- Required: NIST 800-88 Purge or Destroy

Asset-Specific Strategy:

Workstations (500 HDDs/SSDs):

Condition: Mixed HDD and SSD

HDDs:
- Method: Degaussing + physical destruction
- Justification: Guaranteed unrecoverable
- Process: Degauss on-site, shred off-site

SSDs:
- Method: Crypto erase + physical destruction
- Justification: Wear leveling makes overwrite unreliable
- Process: Crypto erase, verify, shred

Alternative (if reuse desired):
- HDDs: Three-pass overwrite, verify, certify
- SSDs: Crypto erase, block erase, verify

Servers (50 units):

Type: Mix of HDD RAID arrays and SSD
Data: Databases with customer records

Method: Physical destruction required
Justification:
- Highest sensitivity data
- RAID complicates sanitization
- Cannot verify all data removed
- Regulatory requirement

Process:
1. Remove drives from arrays
2. Document serial numbers
3. Shred to NSA standard (<2mm)
4. Certificate of destruction

Backup Tapes (200 tapes):

Type: LTO magnetic tape
Data: Full system backups including PII

Method: Degaussing + incineration
Justification:
- Magnetic media, degaussing effective
- Incineration ensures complete destruction
- Tapes cannot be reused after degauss

Process:
1. Inventory all tapes
2. Degauss using NSA-approved degausser
3. Incinerate residual material
4. Document destruction

Third-Party Vendor Requirements:

Vendor selection criteria:
□ NAID AAA certified
□ Chain of custody procedures
□ On-site destruction option
□ Insurance and bonding
□ Certificates of destruction

Contract requirements:
□ NIST 800-88 compliance
□ Witnessed destruction option
□ Video recording available
□ Certificate within 24 hours

Documentation:

Asset TypeCertificate Required
WorkstationsPer-unit serial number list
ServersIndividual certificate per server
TapesBatch certificate with tape IDs

Key insight: Financial data requires the highest sanitization level—Purge at minimum, Destroy preferred. Different media types (HDD, SSD, tape) require different methods. Third-party vendors must be vetted, and chain of custody documentation is essential for regulatory compliance.

Key Terms

disposal decommissioningmedia sanitizationNIST 800-88degaussingcrypto erasedata destructionsecure disposal

Common Mistakes

Overwrite for SSDs—wear leveling makes traditional overwriting unreliable. Use crypto erase or physical destruction.
Degaussing SSDs—degaussing only works on magnetic media. SSDs are flash-based and unaffected.
No verification—sanitization without verification leaves uncertainty. Verify before releasing assets.
Trusting vendors blindly—outsourced destruction still requires oversight, contracts, and certificates.

Exam Tips

NIST 800-88 levels: Clear (overwrite), Purge (crypto/degauss), Destroy (physical).
Degaussing = magnetic field = works on HDD and tape, NOT on SSD.
Crypto erase = delete encryption key = fast, media reusable, requires prior encryption.
SSDs need crypto erase, block erase, or physical destruction. Overwrite is unreliable.
Certificate of destruction = documentation of sanitization with serial numbers, method, date, witness.
Higher data sensitivity = more thorough destruction method required.

Memory Trick

  • NIST 800-88 Levels - "CPD":
  • Clear = overwrite (Can recover with effort)
  • Purge = crypto/degauss (Pretty much unrecoverable)
  • Destroy = physical (Definitely gone forever)

Degaussing Rule: "Degauss = De-magnetize" Works on magnetic media (HDD, tape) Does NOT work on SSD (not magnetic)

  • SSD Sanitization - "CBD":
  • Crypto erase (if encrypted)
  • Block erase (vendor command)
  • Destruction (physical shred)
  • Never rely on overwrite alone!
  • Certificate of Destruction - "SAMPLE":
  • Serial numbers
  • Asset description
  • Method used
  • Personnel who performed
  • Location of destruction
  • Evidence (witness, video)

Disposal Decision: "The more Sensitive, the more Shredded" Highly sensitive = physical destruction

Test Your Knowledge

Q1.Which sanitization method uses a powerful magnetic field to destroy data?

Q2.What is the MOST reliable sanitization method for SSDs with highly sensitive data?

Q3.According to NIST 800-88, which sanitization level makes data recovery infeasible with current technology?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee