NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-88 Guidelines for Media Sanitization
Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology
on Monday 04 September 2006 print the content item {PDF=create pdf file of the content item^plugin:content.52}
in NIST.gov Publications > Special Publications - SP 800 series

NIST Special Publication 800-88 was sponsored by the Homeland Security Department. Media Sanitization is an important subject and is required for all federal agencies. This document attempts to standardize how various media is sanitized before disposal or reuse.

Download the entire NIST SP 800-88 PDF (9/2006 Rev 1)

You may use the NIST.org Forum to ask questions or discuss this document.

Description from NIST.gov SP 800-88 (edited):

Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. This media may require special disposition in order to mitigate the risk of unauthorized disclosure of information and to ensure its confidentiality. Efficient and effective management of information created, processed, and stored by an information technology (IT) system throughout its life (from inception through disposal) is a primary concern of an information system owner.

With the more prevalent use of increasingly sophisticated encryption, an attacker wishing to gain access to an organization’s sensitive information is forced to look outside the system itself for that information. One avenue of attack is the recovery of supposedly deleted data from media. This residual data may allow unauthorized individuals to reconstruct data and thereby gain access to sensitive information. Sanitization, done properly, can be used to thwart this attack by ensuring that deleted data cannot be easily recovered.

When storage media are transferred, become obsolete, or are no longer usable or required by an information system, it is important to ensure that residual magnetic, optical, or electrical representation of data that has been deleted is not easily recoverable. Sanitization refers to the general process of removing data from storage media, such that there is reasonable assurance, in proportion to the confidentiality of the data, that the data may not be retrieved and reconstructed.

This guide will assist organizations and system owners in making practical sanitization decisions based on the level of confidentiality of their information. It does not, and cannot, specifically address all known types of media; however, the described sanitization decision process can be applied universally.

---
The SP 800-88 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


NIST Special Publication # 800-88


Translate to: French German Italian Spanish Portuguese GTM_LAN_DUTCH Russian Chinese Arabic Korean English
Google Ads




Headlines

»CVE-2013-4312
The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial ...
»CVE-2014-9757
The Ignite Realtime Smack XMPP API, as used in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0, allows remote configured XMPP servers to execute arbitrary Java code via serialized data in an XMPP message.
»CVE-2015-2012
The MQXR service in WMQ Telemetry in IBM WebSphere MQ 7.1 before 7.1.0.7, 7.5 through 7.5.0.5, and 8 ...
»CVE-2015-3251
Apache CloudStack before 4.5.2 might allow remote authenticated administrators to obtain sensitive p ...
»CVE-2015-3252
Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual m ...
»CVE-2015-6398
Cisco Nexus 9000 Application Centric Infrastructure (ACI) Mode switches with software before 11.0(1c ...
»CVE-2015-7513
arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state ...
»CVE-2015-7550
The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not pro ...
»CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows ph ...
»CVE-2015-7914
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 allows remote attackers to bypass authentication by ...
»CVE-2015-7915
Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 sends cleartext credentials, which allows remote att ...
»CVE-2015-7916
Cross-site scripting (XSS) vulnerability in Sauter EY-WS505F0x0 moduWeb Vision before 1.6.0 allows r ...
»CVE-2015-8360
An unspecified resource in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 allows remote atta ...
»CVE-2015-8361
Multiple unspecified services in Atlassian Bamboo before 5.9.9 and 5.10.x before 5.10.0 do not requi ...
»CVE-2015-8539
The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a d ...


Date published: 2016-02-10T05:50:00Z
Details

»Microsoft Releases February 2016 Security Bulletin
Original release date: February 09, 2016 Microsoft has released 13 updates to address vulnera ...
»Google Releases Security Update for Chrome
Original release date: February 09, 2016 Google has released Chrome version 48.0.2564.109 to ...
»Adobe Releases Security Updates
Original release date: February 09, 2016 Adobe has released security updates to address vulne ...
»Oracle Releases Security Updates for Java
Original release date: February 08, 2016 Oracle has released security updates to address a vu ...
»Comodo Chromodo Browsers Vulnerable to Cross-Domain Attacks
Original release date: February 04, 2016 Some Comodo Chromodo browser versions (45.8.12.392, ...
»WordPress Releases Security Update
Original release date: February 02, 2016 WordPress 4.4.1 and prior versions contain two secur ...
»FTC Announces Enhancements to IdentityTheft.gov
Original release date: January 29, 2016 The Federal Trade Commission (FTC) has upgraded its I ...
»OpenSSL Releases Security Advisory
Original release date: January 28, 2016 OpenSSL versions 1.0.2f and 1.0.1r have been released ...
»Cisco Releases Security Update
Original release date: January 27, 2016 Cisco has released a security update to address a vul ...
»Mozilla Releases Security Updates
Original release date: January 26, 2016 Mozilla has released security updates to address mult ...


Date published: not known
Details

»Welcome to virusbulletin.com
Almost 20 years after Virus Bulletin revealed its first site on the "world wide web", we've redesign ...
»VB2015 video: TurlaSat: The Fault in our Stars
In a presentation at VB2015 in Prague, Kaspersky Lab researcher Kurt Baumgartner talked about Turla' ...
»Security vendors should embrace those hunting bugs in their products
When interviewed by the Risky Business podcast last week, VB Editor Martijn Grooten talked about the ...
»More VB Conference papers and videos published
More VB2014 Conference papers and videos published - 11 papers and 9 videos added to our website....
»Throwback Thursday: Peter-II - Three Questions of The Sphinx
This Throwback Thursday, VB heads back to 1993, when an ordinary memory-resident master boot sector ...
»VB2015 paper: Effectively testing APT defences
Simon Edwards discusses how to test the potentially untestable....
»VB2015 paper: The ethics and perils of APT research: an unexpected transition into intelligence brokerage
Juan Andrés Guerrero-Saade discusses the perils and ethical conundrums that arise as the industry en ...
»VB2015 paper: Digital 'Bian Lian' (face changing): the Skeleton Key malware
Microsoft, Dell SecureWorks researchers analyse malware targeting Active Directory servers....
»Throwback Thursday: I say Virus, You say Trojan
This Throwback Thursday, VB heads back to 1998 — a time when anti-virus vendors avoided tackling non ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Microsoft Releases February 2016 Security Bulletin
[09 Feb 2016 03:44pm]

» Google Releases Security Update for Chrome
[09 Feb 2016 03:18pm]

» Adobe Releases Security Updates
[09 Feb 2016 11:01am]

» Oracle Releases Security Updates for Java
[08 Feb 2016 02:20pm]

» Comodo Chromodo Browsers Vulnerable to Cross-Domain Attacks
[04 Feb 2016 05:53pm]

» WordPress Releases Security Update
[02 Feb 2016 02:46pm]

» FTC Announces Enhancements to IdentityTheft.gov
[29 Jan 2016 03:36pm]

» OpenSSL Releases Security Advisory
[28 Jan 2016 02:11pm]

» Cisco Releases Security Update
[27 Jan 2016 03:40pm]

» Mozilla Releases Security Updates
[26 Jan 2016 02:56pm]

***
US-CERT Alerts

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

» TA15-213A: Recent Email Phishing Campaigns – Mitigation and Response Recommendations
[01 Aug 2015 04:01pm]

» TA15-195A: Adobe Flash and Microsoft Windows Vulnerabilities
[14 Jul 2015 05:13pm]

» TA15-120A: Securing End-to-End Communications
[29 Apr 2015 10:00pm]

» TA15-119A: Top 30 Targeted High Risk Vulnerabilities
[28 Apr 2015 10:00pm]

» TA15-105A: Simda Botnet
[15 Apr 2015 06:51am]

» TA15-103A: DNS Zone Transfer AXFR Requests May Leak Domain Information
[13 Apr 2015 01:36pm]

***
Computerworld Security

» Poseidon hacker group behind long-running extortion scheme
[10 Feb 2016 06:04am]

» Setting up a Windows 10 picture PIN
[10 Feb 2016 06:00am]

» U.S. regulator: A Google computer could qualify as car driver
[10 Feb 2016 05:51am]

» Google will stop accepting new Flash ads on June 30
[10 Feb 2016 05:18am]

» Identity thieves obtain 100,000 electronic filing PINs from IRS system
[10 Feb 2016 05:13am]

» IDG Contributor Network: Microsoft delivers major updates to Internet Explorer and Adobe Flash Player
[10 Feb 2016 04:54am]

» Google drives email users to up their Gmail security and privacy
[10 Feb 2016 04:15am]

» FBI Director entreats tech firms to release encrypted data used in crimes and terror
[09 Feb 2016 03:32pm]

» Twitter gets an assist in taking on trolls and bullies
[09 Feb 2016 12:30pm]

» Google adds warning to unencrypted emails
[09 Feb 2016 11:36am]

» DoJ fiddles while FBI & DHS burn (after trivial hack of U.S. employee data)
[09 Feb 2016 04:51am]

» U.S. government wants to sharply increase spending on cybersecurity
[09 Feb 2016 04:24am]

» Kingston buys encrypted flash drive maker IronKey
[08 Feb 2016 02:19pm]

» Snowden leaks furor still spilling over into courts
[08 Feb 2016 01:02pm]

» Survey: The state of encryption is strong, but mind the gaps
[08 Feb 2016 10:40am]

***
Microsoft Security Advisories

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 12:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.0
[09 Feb 2016 12:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 12:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 12:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 12:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 12:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 12:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 12:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 12:00am]

» 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0
[10 Nov 2015 12:00am]

» 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0
[13 Oct 2015 01:00am]

» 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0
[13 Oct 2015 01:00am]

» 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1
[13 Oct 2015 01:00am]

» 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0
[08 Sep 2015 01:00am]

» 3074162 - Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege - Version: 1.0
[14 Jul 2015 01:00am]

***
WIRED » Security

» How to Hack the Power Grid Through Home Air Conditioners
[09 Feb 2016 08:40am]

» Donate Your Old USB Drives to Fight North Korean Brainwashing
[09 Feb 2016 07:00am]

» Obama’s New Cybersecurity Plan Sticks to the Most Basic Basics
[09 Feb 2016 03:01am]

» Hack Brief: Hacker Leaks the Info of Thousands of FBI and DHS Employees
[08 Feb 2016 01:33pm]

» It’s Been 20 Years Since This Man Declared Cyberspace Independence
[08 Feb 2016 07:58am]

» Take a Trip to a Time When Viruses Still Called You Names
[08 Feb 2016 05:00am]

» Security News This Week: The White House Bans Its Own Security Researcher
[06 Feb 2016 05:00am]

» Julian Assange’s 3.5-Year Detainment in Embassy Ruled Unlawful
[05 Feb 2016 01:27am]

» Snowden’s Chronicler Reveals Her Own Life Under Surveillance
[04 Feb 2016 07:03am]

» Someone (Mostly) 3-D Printed a Working Semi-Automatic Gun
[03 Feb 2016 05:00am]

***
Network World Security

» Microsoft fixes 36 flaws in IE, Edge, Office, Windows, .NET Framework
[10 Feb 2016 06:52am]

» IBM's X-Force team hacks into smart building
[10 Feb 2016 06:03am]

» Obama’s cybersecurity agenda bold, but relies on untested funding, experts say
[10 Feb 2016 05:58am]

» Identity thieves obtain 100,000 electronic filing PINs from IRS system
[10 Feb 2016 04:20am]

» REVIEW: Cyphort makes advanced threat protection easier than ever
[25 Jan 2016 04:00am]

» Two network video cameras raise the bar for home security
[19 Jan 2016 12:20pm]

» FidSafe: A cloud service for important documents (and the price is right)
[15 Jan 2016 06:23pm]

» Best open source email security products
[11 Jan 2016 04:00am]

» REVIEW: MailScanner and ScrolloutF1 are standouts in open source email security
[11 Jan 2016 04:00am]

» Piper nv: An ambitious home monitoring and automation system
[09 Jan 2016 04:09pm]

» Sentri wants to guard your home but isn't very good at it yet
[20 Dec 2015 04:11pm]

» Dog and Bone LockSmart: The padlock rethought
[19 Dec 2015 12:53pm]

» Review: Best password managers for the enterprise
[07 Dec 2015 04:00am]

» IBM's X-Force team hacks into smart building
[10 Feb 2016 06:03am]

» Setting up a Windows 10 picture PIN
[10 Feb 2016 06:00am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf
Symantec News

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}