01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

eing monitored to protect against misuse of data. Because of this threat, it is of the utmost importance<br />

that organizations acquire certified software/hardware solutions or hire a certified IT Asset Disposition<br />

Company (ITAD) to effectively destroy all remnants of data on all data-bearing devices prior to those<br />

devices leaving their secured facilities.<br />

Assets at Risk<br />

<strong>The</strong> task of destroying this data can sometimes be overwhelming. In a data center, data-bearing assets<br />

range from enterprise storage arrays, hyper-converged storage, servers, blade servers, network<br />

switches, routers, firewalls, storage switches, and access points to assets commonly found in offices. In<br />

an office space, laptops, desktops, high-end Chromebooks, servers, mobile phones, tablets, high-end<br />

printers, scanners, and copiers can all contain sensitive data that must be purged be<strong>for</strong>e removal from<br />

the facility. If that list of assets isn’t daunting enough, consider that <strong>for</strong> each asset type, there may be<br />

hundreds or thousands of combinations of manufacturer, model, and firmware <strong>for</strong> each device type. Each<br />

of these may behave slightly differently than the other and require either specialized knowledge or<br />

software to properly sanitize the data.<br />

What Standards Exist<br />

Fortunately, there are clear standards <strong>for</strong> data sanitization in place and new standards being finalized <strong>for</strong><br />

both present and future use. Gone are the days of Department of <strong>Defense</strong> 3X, 5X, and 7X overwrites.<br />

Today’s storage is too varied and overwrites can be ineffective on certain types of storage media. Luckily,<br />

there are standards in place that provide secure, absolute data sanitization with <strong>for</strong>ensic science to back<br />

them up.<br />

1. NIST SP800-88r1 (2014)<br />

o This standard has been the gold standard since its inception. It is no longer being revised and<br />

there<strong>for</strong>e is not up to date with the latest storage devices and technology. Because of this,<br />

IEEE decided to update it and create a new standard, IEEE 2883.<br />

2. IEEE 2883 (2022/<strong>2023</strong>)<br />

o This standard picks up where NIST left off and accounts <strong>for</strong> the latest storage devices. It will<br />

be the new standard moving <strong>for</strong>ward. It addresses both digital sanitization and physical<br />

destruction of data-bearing assets.<br />

Where to find help<br />

Now that this article has rightfully put some fear into anyone in charge of managing these assets as they<br />

make their transition from in-use to end-of-use, take solace in the fact that there are solutions and<br />

services out there that can mitigate data security risks to the highest standards and provide certifications<br />

that can be used <strong>for</strong> security audits and regulatory compliance. <strong>The</strong>re are vendors that manufacture<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 101<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!