Appendix B
iStorage Security Directive #2 – Sanitisation and Secure Disposal
This iStorage directive provides product support for use by commercial, public service and government agencies alike of
iStorage products. This iStorage Directive #2 advises the best security practices to be employed for sanitisation and secure
disposal of iStorage secure drives which is aligned to the UK Government Directive IS5 concerning secure disposal and
reference – DEP.M.137 which outlines the requirement for secure disposal.
This directive also advises on the reissue of secure drives to mitigate the risk of object reuse, or compromise of data assets
stored on such iStorage secure drives.
The Risk:
If any data assets stored on an iStorage secure drive are not subject to security controls when the drives are
reissued, or disposed of at operational end-of-life, they could be subject to compromise implicating organisational security
and data protection mandated controls, such as GDPR. For example:
• Exfiltration and circulation of sensitive data to unauthorised external actors
• Accidental disclosure
• Disclosure of Protectively Marked or Government Classified data assets
Objective:
Whilst iStorage secure drives enforce protection over their stored data assets by means of robust encryption, it
is nevertheless best security practice to ensure that on occasions when iStorage secure drives are reissued to other parties,
custodians, department, or when they reach their operational end-of-life, the drives are subject to robust processes to ensure
that any remanence of previously stored data assets are securely deleted and purged from that drive to mitigate the likelihood
of compromise of such data assets.
Within this iStorage Security Directive #2 we provide best advice and pragmatic, workable mitigations to counter this threat.
Mitigations:
The mitigations provided below are the recommended and best security practices which should be applied
when handling iStorage secure drives and are shown in Table 1 below. This approach has the objective to preserve the
security mantra of
CIA+A
as outlined within the ISO/IEC 27001 and applies the direction of the NCSC (CESG) document.
CPA Security Characteristic Hardware Media Encryption Version 1.2 Dated April 2012
Process:
Fig 1 below is a representation of the high-level data flow which relates to:
• Secure disposal
• Sanitisation
• Protectively Marked and Government Security Classified data assets
• Reissue of iStorage secure drives
#34
(Confidentiality, Integrity, and Availability + Accountability) and applies relevant security controls
www.istorage-uk.com