S 2.167 Selecting suitable methods for deleting or destroying data

Initiation responsibility: IT Security Officer, Head of IT, Head of Organisation

Implementation responsibility: Head of Organisation, Head of IT, IT Security Officer

In order to ensure the confidentiality of information requiring protection, the information must be destroyed or deleted after use in such a way that the reconstruction of the information can be ruled out with high probability.

For the secure deletion or destruction of the information, there must be suitable methods available on the one hand, as well as suitable devices, applications, or services on the other hand.

There are various methods available to delete or destroy the information on data media. A brief overview can be found in S 2.433 Overview of the methods for deleting and destroying data. The BSI Technical Guideline "Guidelines for the deletion and destruction of information requiring protection on data media" (BSI-TL 03420) provides recommendations for the data media commonly used today. The most important recommendations are presented briefly below.

Recommendations for deleting data media

Deleting data from data media using the simple delete commands available in the respective operating systems or formatting the data media is not adequate to securely delete the data stored on the corresponding data media. For this reason, physical procedures such as treating the corresponding data media mechanically, thermally, or magnetically or overwriting the data media specifically one or more times should be selected as methods for secure deletion. For overwriting, the use of random data patterns is recommended. For data media to be reused in the same protected area, the time and expense required for deletion are lower than for data media that will leave their area of application and will be sold, for example. The following provides an overview of the methods available for deleting the most commonly used data media:

The use of the following methods as deletion methods is not recommended, because they are not reliable and it is possible to reconstruct data deleted using these methods:

Recommendations for the destruction of data media:

A protection class is assigned to the protection requirement in standard DIN 66399:2012 "Destruction of data media", part 1. The protection class can then be used to derive the security levels to be applied to the different data media. For normal protection requirements, protection class 2 is appropriate. Suitable destruction methods and particle sizes for the respective protection classes can be found in DIN 66399 part 2.

The BSI Technical Guideline BSI-TL 03420 describes destruction methods for the different media, e.g. for paper documents, microfilms, magnetic and optical data media, semiconductor memories, and chip cards.

Reliable service providers can also be contracted for data media destruction (see S 2.436 Destruction of data media by external service providers).

Which methods are suitable for deleting or destroying the data and data media used in the organisation depends on how the data is stored, the data media used, and the protection requirements of the information. Any further uses planned for the data media also need to be taken into account. For this reason, a requirements analysis should be performed before selection in order to find suitable methods.

The following questions, amongst other things, must be answered during the requirements analysis:

The deletion of data or the destruction of data media should be performed promptly and at or near the workplace so that the data media do not need to be stored temporarily. This also generally reduces the number of people handling the data media and therefore increases security.

Depending on the protection requirements of the information and the data media used, other tools or devices must be used in order to reliably delete or destroy the data. Some tools and devices are expensive or are not easy to operate correctly. For this reason, it may make sense to sign service contracts with external service providers to this end. In this case, the data media to be disposed of must be collected in the organisation. Burglar-proof collection containers should be placed at suitable locations and emptied regularly to this end.

Destruction devices are subject to wear due to normal use. Improper use or destruction of data media the device was not intended for may damage the device. Therefore, it is necessary to regularly check the particle size, for example by means of a simple visual inspection regarding the data from the device manual.

It must be documented comprehensibly which methods were selected for deleting and destroying the various types of data and the corresponding protection requirements and how to apply these methods.

The employees must receive instructions on how to apply the methods selected for deleting and destroying information, especially if the employees themselves will be using the corresponding tools.

Review questions: