Antonio Jose Segovia
December 7, 2015
Update 2022-4-26.
Today, hard drive and other media devices are less common than they were some years ago, because the current trend is to use the cloud, although there are still a lot of people using pen drives, external hard drives, etc. And, of course, all the information in the cloud is ultimately stored on a server, i.e., its hard disk, which is also a media device. Therefore, secure media disposal is very important to make sure sensitive data do not leak.
ISO 27001 is an international standard for the protection of information, and we will see how this standard can help us with the hard drive disposal and the disposal of other media devices.
First, let’s identify what media we need to take care of, as well as why and how we can securely dispose of them.
Taking into consideration that, in ISO 27001, the most important thing is the information, we need to take care of the media that we are using to store sensitive information. But what do I mean by “media”?
Generally, in this context, a medium is a device that is used for storing information, so media would include hard drives, USB pen drives, external hard drives, CDs, DVDs, etc.
Think about the following scenarios:
Printed documents (e.g., budget drafts, or client’s refused proposals) are no longer needed and used as scratch paper, or accumulated in waiting areas for removal.
Defective equipment (e.g., CEO’s tablet, or project team’s notebooks) being discarded by maintenance staff, put directly in the trash, or sold as scrap.
Equipment considered obsolete (e.g., a five year old server in good condition) sold to recoup part of the investment, or donated to enhance business image.
In these situations, how would someone ensure that document/equipment recovery or reuse would not provide information that may compromise business activities or people’s privacy? In an Internet search, you can find cases where improper disposal of assets and documents was the root cause of the incident:
Fortunately, ISO 27001 can provide some orientation and guidance on how to securely dispose of media and assets in ways which minimize the risks of exposing compromising information.
An important input for media disposal is information classification.
A lot of companies classify their information, because not all media have the same information, and not all of the information has the same value for the business. For example, there is a big difference between a USB pen drive containing a PDF file with a presentation of the business (which can be considered public information), and a USB pen drive containing the company’s database of clients (which can be considered confidential).
So, we need to classify the information, and in Annex A of ISO 27001 we have the control A.8.2.1 Classification of information, which can help us for this purpose. You can find more information about this here: Information classification according to ISO 27001.
Obviously, if the information is public, we can share it in the public domain, because there is not a risk of confidential information leakage.
But, if the information is not public (confidential, restricted, internal, etc.), we need to store and dispose of it in a secure way, because it can carry a risk of confidential information leakage, which can destroy the business, as well as showing noncompliance with legal regulations (like the GDPR).
Besides handling confidential information securely, there are other reasons for secure asset and media disposal. They may appear to be simple activities, since we generally only dispose of things that we deem no longer needed or not valuable. However, thinking about environmental recycling activities, you can see that what is worthless to someone can be highly valuable to someone else.
The same applies to information. Some piece of information we consider not valuable can lead a competitor to gain a business advantage, a criminal to explore an organization’s weaknesses or, worse, cause damage to a customer or person’s life by using personal or private information to commit a crime posing as those persons. No less important, in some cases clients and potential business partners ask for a hard drive destruction certificate.
With the objective to protect a business’ relevant information during its entire lifecycle, ISO 27001 provides two specific controls related to information disposal:
As other forms of control, secure disposal should be supported by an organizational policy.
Regarding media disposal, ISO 27002 recommendations can be summarized as follows:
Disposal procedures should be proportional to the information classification level: The higher the classification, the greater assurance that information cannot be retrieved after disposal. Shredding or incineration of the media, or data overwritten, are examples of good practices.
Clear identification of Information that will require secure disposal: By the use of watermark, or colored border, it is easier for someone to identify the information that should be securely disposed.
Dispose media mixing different types: The greater the mix of different items (e.g., CD’s, HDD’s, paper, etc.) the harder is to recover a specific media, and more secure.
Control access to accumulated media for disposal: A large quantity of non-sensitive information together can make it possible to retrieve sensitive information (aggregation effect). E.g., a great number of old published market reports put together may allow someone to figure out a trend related to a sensitive market strategy. Think about defining a short accumulation period or small storage volume to execute the disposal procedures.
Keep traceability of sensitive disposed items: To ensure the items were properly disposed, you should keep log information listing, at a minimum, who performed the procedure, when, and what method was used.
While the control A.8.3.2 deals with the information and the media where it is stored, the control A.11.2.7 is directed to the proper handling of equipment that makes use of the media, since sometimes it requires more specialized knowledge to access media or to protect it. Here is a compilation of ISO 27002 recommendations for these controls:
Equipment verification prior to disposal or re-use: You should verify whether or not storage media is contained within the equipment (e.g., hard drive or memory chips). You could use a disposal checklist to ensure critical elements are verified.
Use of non-retrievable methods: Physical destruction (e.g., by grinding or shredding) or overwriting techniques, with specific or generic patterns, should be used to perform disposal of highly sensitive information.
Evaluation of damaged equipment: Sometimes damaged devices need to be sent to external parties to be repaired. In these situations, the device should be assessed for sensitive data to determine whether the items should be physically destroyed rather than sent for repair or discarded. ISO 31010 presents a good list of risk assessment techniques which can be used.
Sometimes the volume of items, or the technical requirements for disposal, makes the use of specialized organizations a good option, but care should be taken in selecting a suitable organization. Criteria you should consider are how it manages its security, disposal methods used and experience with your industry. Be sure to include all this in the service contract. For additional recommendations, read 6-step process for handling supplier security according to ISO 27001.
Let’s see an easy example of how to treat the risk of compromising sensitive information on media. You have an asset, which is, for example, a hard drive containing confidential information about the business. This hard drive was installed on an information system (a server), but you decided to move the information to another information system, e.g., to another server or to the cloud.
For the treatment of this risk, you can reduce it by implementing ISO 27001 control A.8.3.2 Disposal of media, and here are some best practices to implement this security control:
Finally, here is a hard drive disposal example – easy and free to perform.
In reality, this method would only be applicable to the most critical and sensitive data, and for data with less criticality, only one of these methods will be enough.
To learn how to implement disposal and other security controls from ISO 27001 Annex A, and to get all the required policies and procedures, sign up for a 14-day free trial of Conformio, the leading ISO 27001 compliance software.