Section 12.108 Asset Disposal and Decommissioning Flashcards

Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.

1
Q

Asset Disposal and Decommissioning

A

Necessity to manage the disposal of outdated assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NIST Special Publication 800-88 (Guidelines for Media Sanitisation)

A

■ Provides guidance on asset disposal and decommissioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sanitisation

A

Thorough process to make data inaccessible and irretrievable from storage medium using traditional forensic methods

Applies to various storage media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sanitisation methods

Overwriting

A

○ Replacing the existing data on a storage device with random bits
of information to ensure that the original data is obscured

○ Repeated several times to reduce any chance of the original data
being recovered

○ Overwriting can use a single pass, 7 passes, or 35 passes - each overrite will make it difficult to retrieve important data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sanitisation methods

Degaussing

A

○ Utilizes a machine called a degausser to produce a strong magnetic field that can disrupt magnetic domains on storage devices like hard drives or tapes

○ Renders data on the storage medium unreadable and irretrievable

○ Permanent erasure of data but makes the device unusable

○ After degaussing, a device can no longer be used to store data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sanitisation methods

Secure Erase

A

○ Deletes data and ensures it can’t be recovered

○ Implemented in firmware level of storage devices

○ Built-in erasure routine purges all data blocks

○ DEPRECATED in favor of cryptographic erase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptographic Erase (CE)

A

○ Utilises encryption technologies for data sanitisation

○ Destroys or deletes encryption keys, rendering data unreadable

○ Quick and efficient method of sanitisation

○ Supports device repurposing without data leakage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Destruction

A

Goes beyond sanitisation, ensures physical device is unusable

Recommended methods:

● Shredding
● Pulverizing
● Melting
● Incinerating

Used for high-security environments, especially with Secret or Top Secret data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Certification

A

■ Acts as proof that data or hardware has been securely disposed of

■ Important for organisations with regulatory requirements

■ Creates an audit log of sanitisation, disposal, or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Retention

A

Strategically deciding what to keep and for how long

■ Data has a lifecycle from creation to disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reasons to retain data

A

● Regulatory requirements
● Historical analysis
● Trend prediction
● Dispute resolution

■ Retaining everything is not feasible due to costs and security risks

■ Clutter and excessive data require additional security measures

The more you store, the more you must secure - increases cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Protection

A

■ All data needs protection from potential data breaches

■ More data requires more extensive security measures

■ Leads to higher costs and resource allocation

■ Excessive data complicates retrieval and analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly