Serving the Critical Data Storage Needs
of Industrial and OEM Customers

FORTASA BLOG

Flash Storage Solutions for Embedded Designs
High Reliability Flash SSDs, Cards and Modules for Industrial Applications

DOD 5220.22-M Requirement - Secure Data Purge From The Flash Storage Device

Posted by Samuel Nakhimovsky on Wednesday, 19 Mar 2014

DoD 5520.22-M Security Data Purge

Another ubiquitous and popular data sanitization method to safely and securely erase sensitive data from a storage device, including Flash SSDs, is DoD 5220.22-M.  This method was initially defined by the US National Industrial Security Program (NISP) in the National Industrial Security Program Operating Manual (NISPOM) and is one of the most commonly used data sanitization methods used in data destruction software. Another item to note is that the NISPOM does not define any US government standard for data sanitization. The Cognizant Security Authority (CSA) is truly responsible for data sanitization standards.

The DoD 5220.22-M data sanitization method is implemented in the following way in Fortasa Flash SSDs.:

  • Pass 1: Erases fully all data
  • Pass 2: Programs a random character and verifies the write
  • Pass 3: Erases fully all data

Utilizing the DoD 5220.22-M secure data scrub method will destructively erase all the stored data on the Flash SSD or module. While not as elaborate as some other software data sanitization methods that are independently defined by various government organizations, the DoD 5220.22-M is fast to execute and achieves a materially complete purge of previously stored information.

Fortasa Flash SSDs and modules include multiple popular data sanitization methods in addition to DoD 5220.22-M.

Please contact Fortasa to discuss the security requirements of your Solid State Storage needs.