Skip to main content
NetApp Knowledge Base

How does disk sanitization in ONTAP help to prevent recovery of data?

Views:
7,094
Visibility:
Public
Votes:
11
Category:
disk-drives
Specialty:
hw
Last Updated:

Applies to

  • FAS and AFF systems
  • ONTAP 9

Description

The disk sanitization feature in ONTAP overwrites and prevents data from being recovered on physical media according to NIST SP 800-88r1 guidelines for media sanitization.

  • Sometimes, when removing data from physical media it is not enough to just delete the data. 
  • When a file is deleted, there are no pointers to the data, but it still physically exists until it is overwritten by new data. 
  • Disk sanitization is commonly performed in instances where there was either a data spill (classified or sensitive data that ends up in an unsecure location) or when physical media is being returned or removed from production.
  • Knowledge of NetApp disk sanitization helps ensure the sanitization method chosen (Clear, Purge or Destroy) meets the confidentiality needs (low, moderate or high impact) of the operational environment.
  • For systems running ONTAP without encrypted drives, leveraging the ‘disk sanitize’ command with three cycles of overwrite patterns applied in succession adheres to the standard laid out by the US Department of Defense (DoD) in the National Industrial Security Program Operating Manual (DoD 5220.22-M) for HDD media (SAS/ SATA/ NL-SAS). 
  • ONTAP systems leveraging encrypted drives can use the ‘encryption disk sanitize’ to cryptographically sanitize SEDs, making the existing data impossible to retrieve, and complying with the NIST 800-88 Purge standard.

 

 

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.