NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
NIST SP 800-88 Guidelines for Media Sanitization
Guidelines for Media Sanitization: Recommendations of the National Institute of Standards and Technology
on Monday 04 September 2006 print the content item {PDF=create pdf file of the content item^plugin:content.52}
in NIST.gov Publications > Special Publications - SP 800 series

NIST Special Publication 800-88 was sponsored by the Homeland Security Department. Media Sanitization is an important subject and is required for all federal agencies. This document attempts to standardize how various media is sanitized before disposal or reuse.

Download the entire NIST SP 800-88 PDF (9/2006 Rev 1)

You may use the NIST.org Forum to ask questions or discuss this document.

Description from NIST.gov SP 800-88 (edited):

Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. This media may require special disposition in order to mitigate the risk of unauthorized disclosure of information and to ensure its confidentiality. Efficient and effective management of information created, processed, and stored by an information technology (IT) system throughout its life (from inception through disposal) is a primary concern of an information system owner.

With the more prevalent use of increasingly sophisticated encryption, an attacker wishing to gain access to an organization’s sensitive information is forced to look outside the system itself for that information. One avenue of attack is the recovery of supposedly deleted data from media. This residual data may allow unauthorized individuals to reconstruct data and thereby gain access to sensitive information. Sanitization, done properly, can be used to thwart this attack by ensuring that deleted data cannot be easily recovered.

When storage media are transferred, become obsolete, or are no longer usable or required by an information system, it is important to ensure that residual magnetic, optical, or electrical representation of data that has been deleted is not easily recoverable. Sanitization refers to the general process of removing data from storage media, such that there is reasonable assurance, in proportion to the confidentiality of the data, that the data may not be retrieved and reconstructed.

This guide will assist organizations and system owners in making practical sanitization decisions based on the level of confidentiality of their information. It does not, and cannot, specifically address all known types of media; however, the described sanitization decision process can be applied universally.

---
The SP 800-88 document was created by the National Institute of Standards and Technology and is public domain (not subject to copyright).


NIST Special Publication # 800-88


Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2012-1038 (networks_mobility_system_software)
Cross-site scripting (XSS) vulnerability in the WebAAA login functionality (wba_login.html) in Junip ...
»CVE-2012-2866 (chrome, opensuse)
Google Chrome before 21.0.1180.89 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-2868 (chrome, opensuse)
Race condition in Google Chrome before 21.0.1180.89 allows remote attackers to cause a denial of ser ...
»CVE-2012-2869 (chrome, opensuse)
Google Chrome before 21.0.1180.89 does not properly load URLs, which allows remote attackers to caus ...
»CVE-2012-5108 (chrome)
Race condition in Google Chrome before 22.0.1229.92 allows remote attackers to execute arbitrary cod ...
»CVE-2012-5121 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5122 (chrome)
Google Chrome before 23.0.1271.64 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5123 (chrome)
Skia, as used in Google Chrome before 23.0.1271.64, allows remote attackers to cause a denial of ser ...
»CVE-2012-5124 (chrome)
Google Chrome before 23.0.1271.64 does not properly handle textures, which allows remote attackers t ...
»CVE-2012-5126 (chrome)
Use-after-free vulnerability in Google Chrome before 23.0.1271.64 allows remote attackers to cause a ...
»CVE-2012-5127 (chrome)
Integer overflow in Google Chrome before 23.0.1271.64 allows remote attackers to cause a denial of s ...
»CVE-2012-5130 (chrome, opensuse)
Skia, as used in Google Chrome before 23.0.1271.91, allows remote attackers to cause a denial of ser ...
»CVE-2012-5136 (chrome, opensuse)
Google Chrome before 23.0.1271.91 does not properly perform a cast of an unspecified variable during ...
»CVE-2012-5137 (chrome, opensuse)
Use-after-free vulnerability in Google Chrome before 23.0.1271.95 allows remote attackers to cause a ...
»CVE-2012-5138 (chrome, opensuse)
Google Chrome before 23.0.1271.95 does not properly handle file paths, which has unspecified impact ...


Date published: 2016-09-30T04:50:20Z
Details

»Google Releases Security Update for Chrome
Original release date: September 30, 2016 Google has released Chrome version 53.0.2785.143 to ...
»Cisco Releases Security Updates
Original release date: September 28, 2016 Cisco has released security updates to address vuln ...
»ISC Releases Security Updates for BIND
Original release date: September 27, 2016 The Internet Systems Consortium (ISC) has released ...
»OpenSSL Releases Security Updates
Original release date: September 23, 2016 | Last revised: September 26, 2016 OpenSSL has rele ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...


Date published: not known
Details

»“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker
An interview with VB2016’s keynote speaker Christine Whalley - Dire ...
»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» Google Releases Security Update for Chrome
[30 Sep 2016 10:35am]

» Cisco Releases Security Updates
[28 Sep 2016 07:00pm]

» ISC Releases Security Updates for BIND
[27 Sep 2016 02:31pm]

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» Firefox blocks websites with vulnerable encryption keys
[30 Sep 2016 11:06am]

» Ransomware spreads through weak remote desktop credentials
[30 Sep 2016 07:22am]

» IDG Contributor Network: The ultimate unanswerable question: Are we PCI-compliant?
[30 Sep 2016 05:27am]

» Sort of gives 'driving safely' a whole new meaning
[30 Sep 2016 04:00am]

» Bounty for iOS jailbreak exploit jumps to $1.5 million
[29 Sep 2016 06:51pm]

» Israeli startup says its new software would have prevented Tesla hack
[29 Sep 2016 12:52pm]

» Investigating Cybersecurity Incidents — a free course
[29 Sep 2016 12:43pm]

» 10 ways to secure a mobile workforce
[29 Sep 2016 06:56am]

» Why employees are still a security risk
[29 Sep 2016 06:00am]

» FBI reports more attempts to hack voter registration system
[29 Sep 2016 05:13am]

» Yahoo hackers weren't state-sponsored, a security firm says
[29 Sep 2016 04:30am]

» Cops run unauthorized searches on confidential databases for revenge, stalking
[28 Sep 2016 11:52am]

» Meet Apache Spot, a new open-source project for cybersecurity
[28 Sep 2016 11:36am]

» Analysts laud and lance new Microsoft browser armor
[27 Sep 2016 02:10pm]

» Six senators demand more details about the Yahoo data breach
[27 Sep 2016 12:45pm]

***
Microsoft Security Advisories

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» How to Steal an AI
[30 Sep 2016 09:06am]

» Turns Out Consumers Stay Loyal to Companies After Hacks
[30 Sep 2016 05:00am]

» Emergency Alert Texts Are Getting a Much Needed Upgrade
[29 Sep 2016 04:37pm]

» A Top-Shelf iPhone Hack Now Goes for $1.5 Million
[29 Sep 2016 04:00pm]

» Time to Kill Security Questions—or Answer Them With Lies
[28 Sep 2016 05:00am]

» Tesla Responds to Chinese Hack With a Major Security Upgrade
[27 Sep 2016 05:00am]

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

***
Network World Security

» Splunk Intent on Extending Cybersecurity Leadership
[30 Sep 2016 11:16am]

» White House asks: Do you need more data portability?
[30 Sep 2016 11:01am]

» Firefox blocks websites with vulnerable encryption keys
[30 Sep 2016 10:36am]

» Ransomware spreads through weak remote desktop credentials
[30 Sep 2016 07:11am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» 10 advanced endpoint protection tools
[05 Jul 2016 04:00am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» Firefox blocks websites with vulnerable encryption keys
[30 Sep 2016 10:36am]

» Ransomware spreads through weak remote desktop credentials
[30 Sep 2016 07:11am]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}