Flash Storage Solutions for Embedded Designs
High Reliability Flash SSDs, Cards and Modules for Industrial Applications
Posted by Samuel Nakhimovsky on Monday, 10 Mar 2014
Practically every government organization has defined it's own requirement for secure and untraceable data removal. One of the such data sanitization methods used to securely purge all stored data from the Flash storage device is a USA-Army 380-19 requirement. Defined in the in Army Regulation 380-19, published by the US Army this method mandates the destructive sequence below to overwrite existing information on a hard drive, SSD, Flash card or other storage device.
The USA-Army 380-19 data sanitization method is defined to be implemented in the following way:
The USA-Army 380-19 data sanitization method is oftentimes used by various data destruction programs and it could be implemented without a final pass verification or without a third pass altogether.
Erasing and re-writing a Solid State Drive using the USA-Army 380-19 data sanitization method will prevent all software and hardware based file recovery methods from re-creating previously stored information from the drive.
Most data destruction implementations support multiple data sanitization methods in addition to USA-Army 380-19.
07 Jul 2020SSD OVERHEATING ISSUE REQUIRES THERMAL THROTTLING
25 Mar 2020ATA Erase
23 Mar 2020FAST SSD DATA ERASE | QUICK ERASE COMMAND
14 Jul 2014Industrial SSD Bill of Material Locking | Who Can You Trust | Fortasa Memory Systems, Inc.
26 Jun 2014Industrial eMMC | Small Size SSD for Embedded Applications