logo
logo
Sign in

What is DoD 5220.22-M (DoD Standard)?

avatar
Standly Silva
What is DoD 5220.22-M (DoD Standard)?

The "DoD standard," referring to DoD 5220.22-M, is commonly used in the data sanitization sector. But what does this "standard" represent for corporations, government agencies, ITADs, and data sanitization solution providers?


To successfully erase previously stored data, the most straightforward approaches replace hard disk drive storage regions. The DoD "standard" and others like it go overwriting a step further with predefined random overwriting processes. At a minimum, such apps will block the data from being recovered by traditional data recovery procedures.



Canva


DoD 5220.22-M was initially used for data erasure in the early days of the data sanitization business. Three secure overwriting passes were necessary, and the last pass was verified. There were no cellphones or flash-based storage systems back in 1995.


Disk erasure overwriting patterns have not been specified in DoD 5220.22-M since at least 2006, although the 3-pass approach is still a common practice when it is used.

The NISP Operating Manual became a federal rule in 2021, the most current modification. Since it supersedes an earlier DOD regulation, it is known as the "NISPOM rule," and it makes no mention of how data should be sanitized.


Physical Data Destruction


The physical destruction of your drives, such as melting, crushing, cremation or shredding, can also be used to sanitize your data.

If you wish to reuse your drives, destroying them physically is not the best option because they will be eliminated. However, even this procedure is not absolute. Even after a disk has been destroyed, data can be recovered if any parts are large enough (particularly on SSDs). On the other hand, data erasure software removes all data from drives before reusing them, saving you money.


Disposal of hard drives and data sanitization for other IT assets such as servers and laptops, and portable media must be governed by policy, regardless of how you choose to do it, whether you use physical destruction or software to erase data. For staff to be able to take proven procedures to keep data safe, these rules should include training for them. Consumer information must be stored and disposed of by the FACTA rule issued by the US Federal Trade Commission, which mandates appropriate storage and disposal of certain consumer information.


For the highest levels of security, the ideal technique to remove data is to use a combination of software-based data erasure and physical destruction. As a result, there's no way the information could be retrieved from any remaining fragments.


DoD Standard


This document is not a standard, as we've previously established that the most recent edition (DoD 5220.22-M) lacks any guidance on how to perform an effective secure-erase.

The handbook mentions that the CSA will publish guidelines on "cleaning, sanitizing, and releasing of IS [information system] material." The Cognizant Security Agencies are responsible for enforcing data sanitization standards.


The DoD 5220.22-M "standard" refers to a vendor's software will write to every accessible hard drive spot with a character, its counterpart, and a random character. A thorough examination of the facts must also follow it. Data can't be retrieved using any commercially available method using this approach.


According to NSA Advisory LAA-006-2004, a single overwrite utilizing the DoD technique was adequate for data sanitization, according to the National Security Agency in autumn 2004. Hard drives that have physically failed or internal hard drives that have been detached can't be wiped clean by disk cleaning software. Solid-state disk's private sectors can't be accessed with this program.


NIST Standard


NIST Special Publication 800-88 has emerged as the de facto data destruction standard in the United States in the last several years. Flash-based storage and mobile devices, which were not included in the DoD process, are addressed in this paper, first produced in 2006 and amended in December 2014.

While we go into further depth in our essay, "What Is NIST 800-88, and What Does "Media Sanitization" Really Mean?" (What is NIST 800-88, and what does "media sanitization" mean?)

Clear for NIST. This methodology employs logical principles to clean up data stored in any area the user may access. It is typically applied to the storage device using the conventional Read and Write commands.


Physical or logical methods prevent modern laboratory procedures from recovering data. This approach uses state-of-the-art techniques to destroy the medium and prevent it from being utilized for data storage again.

collect
0
avatar
Standly Silva
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more