harddrive DoD datawipe certificate

  • Thread starter Thread starter oktokie
  • Start date Start date
O

oktokie

I work at company doing asset management and disposition. Often our
customer require harddrive DoD datawipe as option. When our customer
purchases the service, we'd like to provide some sort of certificate
as proof that service was performed. What are our options? Is there a
software which performs DoD datawipe and generates certificate upon
complete / per harddrive base?

Let me know if anyone know any sort of software or hardware system
which dispenses certificate.

Thanks.

Paul
 
Previously oktokie said:
I work at company doing asset management and disposition. Often our
customer require harddrive DoD datawipe as option. When our customer
purchases the service, we'd like to provide some sort of certificate
as proof that service was performed. What are our options? Is there a
software which performs DoD datawipe and generates certificate upon
complete / per harddrive base?
Let me know if anyone know any sort of software or hardware system
which dispenses certificate.

Not really. Or at least not something that can very easily be
faked. The problems are mainly the following:

1) How do you prove the connection between the customer's data
and the deviece that was wiped?

2) How do you prove that the customer's data was only on that device?

3) For string certificates you would need a tamper-proof disk wipe
system. And a reliable way to tie the certificate to the disk.


Problems with that:

for 1): You basically cannot do this. If the customer had a 1:1 copy
of the disk, you could give them a checksum. But you could
then hand them the disk direcly instead. I take it that is
not really what you want to do.

for 2): You cannot do this with technological means.

for 3): Forget about such a device. Nobody in the security field
dares talk about tamper-proof today. "Tamper resistant"
is the most people arw willing to say, since so many thought
to be secure devices have been broken.


You still want to give the customer some assurance, that the
wipe was really done. After all, you could claim that and never
do it and save money. Here is what I propose:

For each customer and job, have some person be formally
responsible for the secure handling of the data.

1. Before you put any customer data on a disk, have the
person certify that this disk (with serial number from the
label, in a written statement on paper) is now designated
to be used for this specific data/job.

2. When the disk is to be wiped, again have the person
certify this with disk serial, date, time, place.

3. Wipe the disk and have the security person certify.
that it was wiped, agein with serial, time, place.

4. Send the wiped disk to the customer.

Make sure the doscuments are stored in a secure location
were the security person cannot get at them or alter
them afterwards. He/she can of course keep a copy.

You then can do surprise checks on whether doucmentation
and disks do actually match. Depending on the people
involved, these may be unnecessary. You have to trust them
anyways.

In any step you can have additional witnesses certify what happens. Do
not have the disk serial preprinted. Have it filled in by each
witness in their own handwriting and from the disk label. The wiping
should likely be done by somebody else so that there are at least two
witnesses. Step 4 assures that you actually have wiped some disk and
that the customer can at least verify that. Oh, and explain to the
customer how the procedure works. Then they can do surprise checks, if
they like, and check whether the document from step 1. actually exists
and matched the disk their data is on.


Still not perfect, but it significantly reduces any possible gain you
could have by just claiming to have wiped the disk. After all, you do
indeed need to wipe a disk and one in a credible size-range. And you
do need to send a working disk to the customer that has been wiped and
used for an appropriate time (can be checked in SMART data). The only
possible gain on your side I see is that you could slack off in the
documentation steps. But they represent only a minor amount of work,
so most of your incentive to cheat has been removed. Together with the
inspection possibility by the customer, this should be enough to
convince.

Arno
 
oktokie said:
I work at company doing asset management and disposition. Often our
customer require harddrive DoD datawipe as option. When our customer
purchases the service, we'd like to provide some sort of certificate
as proof that service was performed. What are our options? Is there a
software which performs DoD datawipe and generates certificate upon
complete / per harddrive base?

Let me know if anyone know any sort of software or hardware system
which dispenses certificate.

Thanks.

Paul

I would suggest "reverse the problem" give eg. this
http://dban.sourceforge.net/ to the customer or you own product and then
first accept the machines after they are wiped.

Simply because of how easy it is to make a copy of an harddisk, even if you
did find a solution to guarantee a particular disk has been wiped, no
guarantee can be given that the data is gone/unaccessible for ever.
 
lars said:
I would suggest "reverse the problem" give eg. this
http://dban.sourceforge.net/ to the customer or you own product and
then first accept the machines after they are wiped.

A complete waste of time. We reclassify all our DoD drives since we feel
it's not worth taking the chance of one of them coming back to bite us in
the ass. This provides the utmost security and worry free solution for both
parties.

<http://www.geocities.com/ritaberk2006/reclassification.htm>





Rita
 
Previously Rita Ä Berkowitz said:
lars wrote:
A complete waste of time. We reclassify all our DoD drives since we feel
it's not worth taking the chance of one of them coming back to bite us in
the ass. This provides the utmost security and worry free solution for both
parties.

Still does nothing for additional copies. And you have the
problem that you cannot prove which drive was destroyed
afterwards. If you just care about secure deletion and
not about being able to demonstrate it was done, I agree that
it is a good idea to do physical destruction _in_ _addition_
to a data-wipe.

Arno
 
Arno said:
Still does nothing for additional copies. And you have the
problem that you cannot prove which drive was destroyed
afterwards. If you just care about secure deletion and
not about being able to demonstrate it was done, I agree that
it is a good idea to do physical destruction _in_ _addition_
to a data-wipe.

Wrong! It all depends on the person's credentials and/or security clearance
overseeing and documenting the process of when the drives travel from the
customer (DoD) to our kiln. The supposed problem you are thinking of is an
impossibility.






Rita
 
Previously Rita Ä Berkowitz said:
Arno Wagner wrote:
Wrong! It all depends on the person's credentials and/or security
clearance overseeing and documenting the process of when the drives
travel from the customer (DoD) to our kiln. The supposed problem
you are thinking of is an impossibility.

It is actually a very dire real-world fact. It depends on the
persons competence and reliability, not some on-paper
credentials. The transport does introduce additional risks.
And you do not hve a wiped object to show afterwards, so
any claims as to successful destruvtion are not dependent
only on the overseer.

It might be that some people are kidding themselves into
thinking your approach is more secure. Bureaucracies are
prone to this fallacy. Butit real-world characteristics
may be far worse than a single, zero-wipe very close to
the determination that the drive has to be wiped.

Arno
 
Arno said:
It is actually a very dire real-world fact. It depends on the
persons competence and reliability, not some on-paper
credentials. The transport does introduce additional risks.
And you do not hve a wiped object to show afterwards, so
any claims as to successful destruvtion are not dependent
only on the overseer.

It might be that some people are kidding themselves into
thinking your approach is more secure. Bureaucracies are
prone to this fallacy. Butit real-world characteristics
may be far worse than a single, zero-wipe very close to
the determination that the drive has to be wiped.

Again, irrelevant. You do realize that the DoD and other intelligence
agencies that dispose of classified HDs degauss them after their technicians
pull them? They have some very fancy and powerful degaussing machines.
And, no, after they process them the drives will *NEVER* work again even if
you got one to try. By the time they make it to the kiln the only thing
they are worried about is a certification of final destruction. Of course
this can also be done under a hydraulic press, but the scrap metal
separation is more difficult.







Rita
 
Back
Top