SlideShare a Scribd company logo
1 of 26
Data Sanitization:
When, Why & How
FREDRIK FORSLUND
Director, Cloud & Data Center Erasure Solutions
Blancco Technology Group
Data Storage: Past & Present
2
1940
Punched Cards
1956
Hard Drive
1985
DVD
2006
The Cloud
2000
USB Drive
1951
Magnetic Tape
First computer
sold for
$750,000
1971
Floppy Disks
Removable &
Rewritable
2013
Data Security Challenges
3
# of Data
Per Device
Peta
Bytes
Tera
Bytes
Giga
Bytes
00s 000s 0000s
# of data
bearing devices
Security Risk
Per Data Storage
Device*
Data center
& Cloud data
PCs &
Office Servers
Smartphones
Tablets, USB sticks
Cloud Security Pain Points
The Lifecycle of IT Assets
Cloud Storage:
Where Erasure Responsibility Lies
It falls to
“…the provider to keep that data secure, and when it is
deleted, the provider should ensure (or be able to
prove) that it is permanently destroyed.”
4 Scenarios Where Data Erasure
Is Absolutely Necessary
7
When Equipment
Hits End of Life
After Data
Migration
When Data Hits
End of Life
When Customers
Demand (“Right to
be Forgotten”)
Common Process:
• Security policy does not allow drives to leave the
data center.
• Expensive contracts with manufacturers to “keep
my drive” in place, combined with destruction
costs.
Improved Process:
• Erase and securely send back drives under
warranty.
• Very high cost savings and enhanced
auditability.
When Data Erasure Is Necessary:
Break Fix Need
• Cap Gemini erased 2 SANs in the
Nordics from Poland through
remote erasure.
• When erasure was done, local
recycling company came and
picked up systems for reselling
them.
• Cap Gemini got money back
instead of spending money on
physical destruction.
When Data Erasure Is Necessary:
SAN Decommisioning
• Data Entry
• Data Migration within
Data Center(s)
• Data Exit
• Disaster recovery
exercises
• Test data
• Mergers and
acquisitions
When Data Erasure Is Necessary:
Planned Data Migration and DC
Consolidation
Target Both LUNs and VMs
• Enable customer to feel
secure that data is erased
securely
• Detailed auditable report
provided
• Competitive advantage
compared to others
• On-Demand, integration or
automization
When Data Erasure Is Necessary: Customers
Terminating Virtual Machines in the IaaS Cloud
Data Breaches: ISO/IEC 27040
Security Threats Types of Data Breaches
Theft of storage element or media
Unlawful access, unlawful disclosure, unlawful data loss, unlawful data
destruction
Loss of storage element or media
Unauthorized access, unauthorized disclosure, accidental data loss,
accidental data destruction
Loss of data Unlawful, unauthorized, or accidental data destruction or corruption
Accidental configuration changes (e.g., storage management,
storage/network resources, incorrect patch management, etc.) by
authorized personnel
Accidental access, accidental disclosure, accidental data destruction,
accidental data alteration
Malicious configuration changes (storage management, storage/network
resources, application tampering, etc.) by external or internal
adversaries
Unlawful access, unlawful disclosure, unlawful data destruction, unlawful
data alteration
Privileged user abuses by authorized users (e.g., inappropriate data
snooping)
Unlawful/unauthorized access or disclosure
Malicious data tampering by external or internal adversaries Unlawful data destruction or alteration
Denial of service attacks Unauthorized data destruction, loss, or alteration
Malicious monitoring of network traffic Unlawful/unauthorized disclosure
The Daily Reality of Data Breaches
13
76 Million People Affected
Information
Compromised: Names,
Addresses, Phone
Numbers and Email
Addresses
56 Million People Affected
Information Compromised:
Credit Card and Debit Card
Numbers
145 Million People Affected
Information Compromised:
Encrypted Passwords, Customer
Names, Email Addresses, Mailing
Addresses, Phone Numbers and
Dates of Birth
Enterprise Businesses & Government
Bodies Must Get on Board
National Data
Protection Law
EU Data Protection
Regulation 2015
„Right to
Erasure“
ISO Standard
27001, 27040 etc.
Sarbanes-Oxley
HIPAA
(Health
Insurance
Portabiltiy and
Accountability)
Credit Card
Industry PCI-
DSS
How Does Secure Data Erasure Work?
Format or Delete Data Erasure
Physical Level
Logical Storage
(LUNs)
Virtual Machines
(VMs)
Virtual Machines/Servers and
vApps (grouped VMs) hosted on
various hypervisors
Logical Unit Numbers (LUNs) viewed as
virtual drives dedicated to data storage
on Storage Area Networks (SANs)
Physical Level:
Servers, HDDs, etc.
Asset
End-of-life
Data
End-of-life
DEaaSData Erasure as a Service
Data Erasure as a Service
DISK Erasure (HDD
and SSD)
SERVER
Erasure
FILE Erasure
LUN Erasure
VIRTUAL
Erasure
Total Erasure on Physical Level:
Erasure at File, Logical & Virtual
Levels
01
02
03
04
ISO/IEC 27001: Setting the Bar High for
Security Standards
19
TOP
MANAGEMENT
Must implement
information security
policy themselves
RISK
MANAGEMENT
Relevant security
risks should be
addressed and
mitigated
INTERNAL
AUDITS
Must verify all
security risks have
been addressed
and operational
processes are set
DATA REMOVAL
Sensitive data and
licensed software
must be securely
removed prior to
disposal or reuse
ISO 27018: Protection of Privacy &
Personal Data in the Cloud
20
Home PC
Push Sync
Back Up All Files
Work Laptop
Push Sync
Work Files
Notebook
Smart Sync
Select Files
Tablet
Sync Local
Stream the Rest
Smartphone
Sync a Few
Stream the Rest
!
My Documents My Photos My Music My Work Files Special Project
Stay Current With New
ISO Recommendations
21
01
02
03
“Logical sanitization (see 6.8.1.3) should be used to clear virtualized storage,
especially when the actual storage devices and media cannot be determined.”
“Sanitization of media at end-of-use situations
is recommended, even when using encryption
methods.”
Erase on Logical & Virtual
Level
Add onto
Encryption
Maintain Sanitization Records
Organizations should maintain a record of sanitization activities to
document what media were sanitized, when, how they were sanitized, and
the final disposition of the media.
Recovery of Virtual Machines
A Case Study
A Case Study (San Francisco)
Corporate Facts:
• Founded in 2007 and product released
in 2008
• One of the largest AWS S3 customers
• Running tens of thousands of servers in
multiple data centers
• Managing hundreds of billions of files –
and growing
A Case Study: Dropbox
CONSENSUS ASSESSMENTS INITIATIVE
QUESTIONNAIRE v3.0.1
Dropbox uses secure deletion process to
delete data once a customer has
permanently deleted a file from their
Dropbox account or after service
termination.
A Case Study: IBM Cloud:
Bare Metal

More Related Content

What's hot

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataOpenAIRE
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slidesNaomi Holmes
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital AgeJane Prusakova
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?IT Governance Ltd
 
skillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxskillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxRahulGarg294918
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationVicky Dallas
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPRDipanjanDey12
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and SecurityAnuMarySunny
 

What's hot (20)

Data Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive dataData Processing - data privacy and sensitive data
Data Processing - data privacy and sensitive data
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
GDPR: Key Article Overview
GDPR: Key Article OverviewGDPR: Key Article Overview
GDPR: Key Article Overview
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
Privacy In The Digital Age
Privacy In The Digital AgePrivacy In The Digital Age
Privacy In The Digital Age
 
Gdpr presentation
Gdpr presentationGdpr presentation
Gdpr presentation
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
skillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptxskillcast-gdpr-training-presentation-q320.pptx
skillcast-gdpr-training-presentation-q320.pptx
 
GDPR and Security.pdf
GDPR and Security.pdfGDPR and Security.pdf
GDPR and Security.pdf
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Data protection
Data protectionData protection
Data protection
 
Data protection
Data protectionData protection
Data protection
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Information privacy and Security
Information privacy and SecurityInformation privacy and Security
Information privacy and Security
 

Similar to Data Sanitization: When, Why & How

Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device ControlHassaanSahloul
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence SystemJoseph Yosi Margalit
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...Ulf Mattsson
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Data Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact LevelData Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact LevelICEXLimited
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data PrivateDobler Consulting
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignmentnaterator
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeJisc
 
Database Security Management
Database Security Management Database Security Management
Database Security Management Ahsin Yousaf
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptApdiazizHussein
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla IsolationCybryx
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...Ulf Mattsson
 

Similar to Data Sanitization: When, Why & How (20)

Sanctuary Device Control
Sanctuary Device ControlSanctuary Device Control
Sanctuary Device Control
 
Secure Financial Intelligence System
Secure Financial Intelligence SystemSecure Financial Intelligence System
Secure Financial Intelligence System
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Cloud data governance, risk management and compliance ny metro joint cyber...
Cloud data governance, risk management and compliance    ny metro joint cyber...Cloud data governance, risk management and compliance    ny metro joint cyber...
Cloud data governance, risk management and compliance ny metro joint cyber...
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Data Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact LevelData Destruction Process depending on the Impact Level
Data Destruction Process depending on the Impact Level
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data Private
 
Power Point example for module 3 assignment
Power Point example for module 3 assignmentPower Point example for module 3 assignment
Power Point example for module 3 assignment
 
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgradeNext generation storage: eliminating the guesswork and avoiding forklift upgrade
Next generation storage: eliminating the guesswork and avoiding forklift upgrade
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40SFScon19 - Francesco La Spina -7 Steps to Industry 40
SFScon19 - Francesco La Spina -7 Steps to Industry 40
 
dokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.pptdokumen.tips_comptia-a.ppt
dokumen.tips_comptia-a.ppt
 
Data security
Data securityData security
Data security
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
SPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable WorkplaceSPYRUS Secure Portable Workplace and Portable Workplace
SPYRUS Secure Portable Workplace and Portable Workplace
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Harris Bdr
Harris BdrHarris Bdr
Harris Bdr
 
Practical advice for cloud data protection ulf mattsson - bright talk webin...
Practical advice for cloud data protection   ulf mattsson - bright talk webin...Practical advice for cloud data protection   ulf mattsson - bright talk webin...
Practical advice for cloud data protection ulf mattsson - bright talk webin...
 

More from Blancco

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Blancco
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyBlancco
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Blancco
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Blancco
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...Blancco
 
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...Blancco
 
Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Blancco
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Blancco
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights Blancco
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Blancco
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwayBlancco
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesBlancco
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance? Blancco
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantBlancco
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Blancco
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserBlancco
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 

More from Blancco (20)

Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
Beyond Diagnostics & Erasure – The Future of Ultra-Efficient Mobile Device Pr...
 
Enabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer JourneyEnabling End-to-End Mobile Customer Journey
Enabling End-to-End Mobile Customer Journey
 
Blancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & UpdatesBlancco Recharge - BMDE Optimizations & Updates
Blancco Recharge - BMDE Optimizations & Updates
 
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
Meet GDPR ‘Right to Erasure’ Requirements: Erase Customer Data Permanently & ...
 
Blancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADsBlancco Bytes- Product Updates for ITADs
Blancco Bytes- Product Updates for ITADs
 
Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle Toronto Event- How to Protect Data Throughout Its Lifecycle
Toronto Event- How to Protect Data Throughout Its Lifecycle
 
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
[UK & EU Webinar] The Top 3 Data Sanitisation Challenges – And How to Overcom...
 
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
[US & Canda Webinar] The Top 3 Data Sanitization Challenges – And How to Over...
 
Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution Making the Case- Blancco Data Center Eraser Solution
Making the Case- Blancco Data Center Eraser Solution
 
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
Data Erasure Management: How to Protect Data Throughout Its Lifecycle - Blanc...
 
EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights EU GDPR- The Countdown to Compliance, Research Study Highlights
EU GDPR- The Countdown to Compliance, Research Study Highlights
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report Data Governance in the Enterprise: Highlights from Our Research Report
Data Governance in the Enterprise: Highlights from Our Research Report
 
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go AwaySolid State Drives (SSDs) -What it Takes to Make Data Go Away
Solid State Drives (SSDs) -What it Takes to Make Data Go Away
 
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State DrivesWebinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
Webinar- Overcoming the Unseen Data Destrution Issues in Solid State Drives
 
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
Security Regulations & Guidelines:  Is Your Business on the Path to Compliance? Security Regulations & Guidelines:  Is Your Business on the Path to Compliance?
Security Regulations & Guidelines: Is Your Business on the Path to Compliance?
 
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay CompliantCloud Storage: How to Fight Off Data Security Threats & Stay Compliant
Cloud Storage: How to Fight Off Data Security Threats & Stay Compliant
 
Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files Delete vs Erase: How Are Companies Wiping Active Files
Delete vs Erase: How Are Companies Wiping Active Files
 
An Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud EraserAn Introduction to Live Environment and Cloud Eraser
An Introduction to Live Environment and Cloud Eraser
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Data Sanitization: When, Why & How

  • 1. Data Sanitization: When, Why & How FREDRIK FORSLUND Director, Cloud & Data Center Erasure Solutions Blancco Technology Group
  • 2. Data Storage: Past & Present 2 1940 Punched Cards 1956 Hard Drive 1985 DVD 2006 The Cloud 2000 USB Drive 1951 Magnetic Tape First computer sold for $750,000 1971 Floppy Disks Removable & Rewritable 2013
  • 3. Data Security Challenges 3 # of Data Per Device Peta Bytes Tera Bytes Giga Bytes 00s 000s 0000s # of data bearing devices Security Risk Per Data Storage Device* Data center & Cloud data PCs & Office Servers Smartphones Tablets, USB sticks
  • 5. The Lifecycle of IT Assets
  • 6. Cloud Storage: Where Erasure Responsibility Lies It falls to “…the provider to keep that data secure, and when it is deleted, the provider should ensure (or be able to prove) that it is permanently destroyed.”
  • 7. 4 Scenarios Where Data Erasure Is Absolutely Necessary 7 When Equipment Hits End of Life After Data Migration When Data Hits End of Life When Customers Demand (“Right to be Forgotten”)
  • 8. Common Process: • Security policy does not allow drives to leave the data center. • Expensive contracts with manufacturers to “keep my drive” in place, combined with destruction costs. Improved Process: • Erase and securely send back drives under warranty. • Very high cost savings and enhanced auditability. When Data Erasure Is Necessary: Break Fix Need
  • 9. • Cap Gemini erased 2 SANs in the Nordics from Poland through remote erasure. • When erasure was done, local recycling company came and picked up systems for reselling them. • Cap Gemini got money back instead of spending money on physical destruction. When Data Erasure Is Necessary: SAN Decommisioning
  • 10. • Data Entry • Data Migration within Data Center(s) • Data Exit • Disaster recovery exercises • Test data • Mergers and acquisitions When Data Erasure Is Necessary: Planned Data Migration and DC Consolidation Target Both LUNs and VMs
  • 11. • Enable customer to feel secure that data is erased securely • Detailed auditable report provided • Competitive advantage compared to others • On-Demand, integration or automization When Data Erasure Is Necessary: Customers Terminating Virtual Machines in the IaaS Cloud
  • 12. Data Breaches: ISO/IEC 27040 Security Threats Types of Data Breaches Theft of storage element or media Unlawful access, unlawful disclosure, unlawful data loss, unlawful data destruction Loss of storage element or media Unauthorized access, unauthorized disclosure, accidental data loss, accidental data destruction Loss of data Unlawful, unauthorized, or accidental data destruction or corruption Accidental configuration changes (e.g., storage management, storage/network resources, incorrect patch management, etc.) by authorized personnel Accidental access, accidental disclosure, accidental data destruction, accidental data alteration Malicious configuration changes (storage management, storage/network resources, application tampering, etc.) by external or internal adversaries Unlawful access, unlawful disclosure, unlawful data destruction, unlawful data alteration Privileged user abuses by authorized users (e.g., inappropriate data snooping) Unlawful/unauthorized access or disclosure Malicious data tampering by external or internal adversaries Unlawful data destruction or alteration Denial of service attacks Unauthorized data destruction, loss, or alteration Malicious monitoring of network traffic Unlawful/unauthorized disclosure
  • 13. The Daily Reality of Data Breaches 13 76 Million People Affected Information Compromised: Names, Addresses, Phone Numbers and Email Addresses 56 Million People Affected Information Compromised: Credit Card and Debit Card Numbers 145 Million People Affected Information Compromised: Encrypted Passwords, Customer Names, Email Addresses, Mailing Addresses, Phone Numbers and Dates of Birth
  • 14.
  • 15. Enterprise Businesses & Government Bodies Must Get on Board National Data Protection Law EU Data Protection Regulation 2015 „Right to Erasure“ ISO Standard 27001, 27040 etc. Sarbanes-Oxley HIPAA (Health Insurance Portabiltiy and Accountability) Credit Card Industry PCI- DSS
  • 16. How Does Secure Data Erasure Work? Format or Delete Data Erasure
  • 17. Physical Level Logical Storage (LUNs) Virtual Machines (VMs) Virtual Machines/Servers and vApps (grouped VMs) hosted on various hypervisors Logical Unit Numbers (LUNs) viewed as virtual drives dedicated to data storage on Storage Area Networks (SANs) Physical Level: Servers, HDDs, etc. Asset End-of-life Data End-of-life DEaaSData Erasure as a Service Data Erasure as a Service
  • 18. DISK Erasure (HDD and SSD) SERVER Erasure FILE Erasure LUN Erasure VIRTUAL Erasure Total Erasure on Physical Level: Erasure at File, Logical & Virtual Levels
  • 19. 01 02 03 04 ISO/IEC 27001: Setting the Bar High for Security Standards 19 TOP MANAGEMENT Must implement information security policy themselves RISK MANAGEMENT Relevant security risks should be addressed and mitigated INTERNAL AUDITS Must verify all security risks have been addressed and operational processes are set DATA REMOVAL Sensitive data and licensed software must be securely removed prior to disposal or reuse
  • 20. ISO 27018: Protection of Privacy & Personal Data in the Cloud 20 Home PC Push Sync Back Up All Files Work Laptop Push Sync Work Files Notebook Smart Sync Select Files Tablet Sync Local Stream the Rest Smartphone Sync a Few Stream the Rest ! My Documents My Photos My Music My Work Files Special Project
  • 21. Stay Current With New ISO Recommendations 21 01 02 03 “Logical sanitization (see 6.8.1.3) should be used to clear virtualized storage, especially when the actual storage devices and media cannot be determined.” “Sanitization of media at end-of-use situations is recommended, even when using encryption methods.” Erase on Logical & Virtual Level Add onto Encryption Maintain Sanitization Records Organizations should maintain a record of sanitization activities to document what media were sanitized, when, how they were sanitized, and the final disposition of the media.
  • 24. A Case Study (San Francisco) Corporate Facts: • Founded in 2007 and product released in 2008 • One of the largest AWS S3 customers • Running tens of thousands of servers in multiple data centers • Managing hundreds of billions of files – and growing
  • 25. A Case Study: Dropbox CONSENSUS ASSESSMENTS INITIATIVE QUESTIONNAIRE v3.0.1 Dropbox uses secure deletion process to delete data once a customer has permanently deleted a file from their Dropbox account or after service termination.
  • 26. A Case Study: IBM Cloud: Bare Metal

Editor's Notes

  1. 250 million units sold, makes you think about how fast things change in the IT industry
  2. This is a topic which could be discussed with ALL Data Centers. What is their current process and how much money can they save by investing in Blancco? Software erasure (with or without hardware module) for individual HDDs and SSDs is available as well as Degaussing for broken drives.
  3. NIST 800-88
  4. Unless you proactively sanitize data in your environment, external or internal attackers as well as malware can maliciously perform data recovery that lead to data leaks.
  5. Global security regulations and standards which are increasingly demanded for and adhered by Cloud providers and their end-customers.
  6. Overwriting, wiping, data erasure
  7. The data centers of today need to master several levels of data erasure to offer their customers the best possible security. Blancco has solutions for every level.
  8. ISO 27018 is already released and ensures protection of privacy and personal data. ISO 27017 is coming. It ensures security controls for cloud providers.
  9. Our partner Kroll Ontrack have informed us that recreating deleted (not erased) Virtual Machines is feasible in many different situations and environments.
  10. When a Dropbox storage disk has reached the end of its life or is damaged, we follow a decommissioning process that is designed to destroy the disk to the point data cannot be reasonably recovered. Our managed service provider also follows secure destruction processes for media they control.”