Disposal and Decommissioning
Secure disposal methods including sanitization, destruction, and certification for end-of-life assets. Understanding NIST 800-88 media sanitization standards and compliance requirements.
Understanding Disposal and Decommissioning
Disposal and decommissioning ensures data is irrecoverable when assets reach end of life. Improper disposal has caused major breaches—discarded drives with recoverable data regularly appear in second-hand markets.
Key disposal concepts: • Sanitization — Remove data from media • Destruction — Physically destroy media • Certification — Document proper disposal • Compliance — Meet regulatory requirements
In 2019, Morgan Stanley was fined $60 million after decommissioning data center equipment without proper sanitization. Old servers containing customer PII were sold at auction with data still recoverable. The bank outsourced disposal but remained legally responsible.
Data must be irrecoverable before assets leave your control.
Why This Matters for the Exam
Disposal and decommissioning is tested on SY0-701 because improper disposal causes breaches. Questions cover sanitization methods, destruction techniques, and when to use each.
Understanding disposal helps with data protection, compliance, and risk management. Data on disposed assets is a common breach source.
The exam tests recognition of sanitization methods and appropriate selection.
Deep Dive
What Is Media Sanitization?
Sanitization removes data from media so it cannot be recovered.
NIST 800-88 Sanitization Levels:
| Level | Method | Recovery | Use Case |
|---|---|---|---|
| Clear | Overwrite | Difficult | Reuse internally |
| Purge | Enhanced clear | Infeasible | Reuse externally |
| Destroy | Physical | Impossible | Sensitive data |
Clear:
Method: Overwrite with zeros/patterns Recovery: Difficult but theoretically possible Suitable for: Internal reuse, low sensitivity Examples: - Single-pass overwrite - Format with overwrite - Factory reset with overwrite
Purge:
Method: Multiple overwrites or crypto-erase Recovery: Infeasible with current technology Suitable for: External reuse, moderate sensitivity Examples: - Block erase on SSD - Cryptographic erase - Degaussing (for HDD) - Multiple overwrite passes
Destroy:
Method: Physical destruction Recovery: Impossible Suitable for: Highly sensitive, no reuse Examples: - Shredding - Disintegration - Incineration - Pulverization
What Are Specific Sanitization Methods?
Overwriting:
Process: Write data patterns over existing data Passes: Single or multiple Tools: DBAN, vendor utilities Pros: - Media can be reused - Relatively fast - No special equipment Cons: - May not reach all areas (bad sectors) - Not effective for SSDs (wear leveling) - Time-consuming for large drives
Degaussing:
Process: Powerful magnetic field destroys data Targets: Magnetic media (HDD, tape) Result: Media usually destroyed Pros: - Fast - Effective for magnetic media - Irreversible Cons: - Destroys the media - Doesn't work on SSDs - Requires degausser equipment
Cryptographic Erase:
Process: Delete encryption key, data unreadable Requirement: Media must be encrypted Result: Data irrecoverable without key Pros: - Very fast - Media reusable - Works on SSDs Cons: - Requires encryption was enabled - Relies on proper key destruction - Implementation-dependent
Physical Destruction:
Methods: - Shredding: Cut into small pieces - Pulverizing: Grind to powder - Disintegrating: Reduce to particles - Incineration: Burn at high temperature When to use: - Highest sensitivity data - Compliance requirements - Cannot verify sanitization - Media cannot be sanitized (damaged)
What About SSDs and Flash Media?
SSDs require different approaches than HDDs.
SSD Challenges:
| Challenge | Impact |
|---|---|
| Wear leveling | Data spread across chips |
| Over-provisioning | Hidden capacity |
| Bad block management | Data in inaccessible areas |
| Trim not guaranteed | Deleted data may persist |
SSD Sanitization Options:
| Method | Effectiveness |
|---|---|
| Overwrite | Unreliable (wear leveling) |
| Crypto erase | Effective if encrypted |
| Block erase | Effective (vendor command) |
| Physical destruction | Most reliable |
SSD Best Practice:
For reuse: - Crypto erase (if encrypted) - Vendor secure erase command For disposal: - Physical destruction - Shred to small particle size
What Documentation Is Required?
Certificate of Destruction:
Must include: - Asset identification (serial numbers) - Sanitization method used - Date of sanitization - Personnel performing sanitization - Witness signature (if required) - Verification method - Disposal method for media
Chain of Custody:
Track from: 1. Decommissioning decision 2. Data backup/migration 3. Transport to sanitization 4. Sanitization performed 5. Verification completed 6. Final disposal/recycling 7. Certificate issued
What Is the Decommissioning Process?
Decommissioning Steps:
| Step | Activities |
|---|---|
| 1. Plan | Identify data, backup needs, timeline |
| 2. Backup | Migrate needed data |
| 3. Revoke | Remove access, certificates |
| 4. Sanitize | Apply appropriate method |
| 5. Verify | Confirm sanitization |
| 6. Document | Certificate of destruction |
| 7. Dispose | Recycle or destroy |
| 8. Update | Remove from inventory |
How CompTIA Tests This
Example Analysis
Scenario: A bank is decommissioning 500 workstations, 50 servers, and 200 backup tapes. The equipment contains customer financial data (PII). Design a disposal strategy.
Analysis - Financial Data Disposal:
Data Classification:
Customer financial data: - PII (names, SSN, account numbers) - Regulatory: GLBA, PCI-DSS - Classification: Restricted/Highly Sensitive - Required: NIST 800-88 Purge or Destroy
Asset-Specific Strategy:
Workstations (500 HDDs/SSDs):
Condition: Mixed HDD and SSD HDDs: - Method: Degaussing + physical destruction - Justification: Guaranteed unrecoverable - Process: Degauss on-site, shred off-site SSDs: - Method: Crypto erase + physical destruction - Justification: Wear leveling makes overwrite unreliable - Process: Crypto erase, verify, shred Alternative (if reuse desired): - HDDs: Three-pass overwrite, verify, certify - SSDs: Crypto erase, block erase, verify
Servers (50 units):
Type: Mix of HDD RAID arrays and SSD Data: Databases with customer records Method: Physical destruction required Justification: - Highest sensitivity data - RAID complicates sanitization - Cannot verify all data removed - Regulatory requirement Process: 1. Remove drives from arrays 2. Document serial numbers 3. Shred to NSA standard (<2mm) 4. Certificate of destruction
Backup Tapes (200 tapes):
Type: LTO magnetic tape Data: Full system backups including PII Method: Degaussing + incineration Justification: - Magnetic media, degaussing effective - Incineration ensures complete destruction - Tapes cannot be reused after degauss Process: 1. Inventory all tapes 2. Degauss using NSA-approved degausser 3. Incinerate residual material 4. Document destruction
Third-Party Vendor Requirements:
Vendor selection criteria: □ NAID AAA certified □ Chain of custody procedures □ On-site destruction option □ Insurance and bonding □ Certificates of destruction Contract requirements: □ NIST 800-88 compliance □ Witnessed destruction option □ Video recording available □ Certificate within 24 hours
Documentation:
| Asset Type | Certificate Required |
|---|---|
| Workstations | Per-unit serial number list |
| Servers | Individual certificate per server |
| Tapes | Batch certificate with tape IDs |
Key insight: Financial data requires the highest sanitization level—Purge at minimum, Destroy preferred. Different media types (HDD, SSD, tape) require different methods. Third-party vendors must be vetted, and chain of custody documentation is essential for regulatory compliance.
Key Terms
Common Mistakes
Exam Tips
Memory Trick
- •NIST 800-88 Levels - "CPD":
- •Clear = overwrite (Can recover with effort)
- •Purge = crypto/degauss (Pretty much unrecoverable)
- •Destroy = physical (Definitely gone forever)
Degaussing Rule: "Degauss = De-magnetize" Works on magnetic media (HDD, tape) Does NOT work on SSD (not magnetic)
- •SSD Sanitization - "CBD":
- •Crypto erase (if encrypted)
- •Block erase (vendor command)
- •Destruction (physical shred)
- •Never rely on overwrite alone!
- •Certificate of Destruction - "SAMPLE":
- •Serial numbers
- •Asset description
- •Method used
- •Personnel who performed
- •Location of destruction
- •Evidence (witness, video)
Disposal Decision: "The more Sensitive, the more Shredded" Highly sensitive = physical destruction
Test Your Knowledge
Q1.Which sanitization method uses a powerful magnetic field to destroy data?
Q2.What is the MOST reliable sanitization method for SSDs with highly sensitive data?
Q3.According to NIST 800-88, which sanitization level makes data recovery infeasible with current technology?
Want more practice with instant AI feedback?
Continue Learning
Ready for the Exam?
See exactly where you stand on this concept and 182 others.
99% pass rate · Pass guarantee