Probably too late for consideration at this point, but there are Enterprise Class SSDs available with DoD/NSA certified/approved self encryption capability. The concept is that encryption is a hardware feature of the drive, when you want to dispose of it, you throw away the key. This allows vendors to receive broken drives back from GOV/MIL clients securely so that failure methods can be researched.
Dell and EMC have been presenting this to us at storage briefs for a couple of years now.
--Sean
On Thu, May 10, 2018 at 8:00 AM centos-request@centos.org wrote:
From: m.roth@5-cent.us To: CentOS mailing list centos@centos.org Cc: Bcc: Date: Wed, 9 May 2018 11:35:21 -0400 Subject: Re: [CentOS] OT: hardware: sanitizing a dead SSD? James Szinger wrote:
Disclaimer: My $dayjob is with a government contractor, but I am speaking as private citizen.
Talk to your organization's computer security people. They will have a standard procedure for getting rid of dead disks. We on the internet can't > know what they are. I'm betting it involves some degree of
paperwork.
Around here, I give the disks to my local computer support who in turn give them the institutional disk destruction team. I also zero-fill the
disk
if possible, but that's not an official requirement. The disk remains sensitive until the process is complete.
Federal contractor here, too. (I'm the OP). For disks that work, shred or DBAN is what we use. For dead disks, we do the paperwork, and get them deGaussed. SSD's are a brand new issue. We haven't had to deal with them yet, but it's surely coming, so we might as well figure it out now.
mark