24 Product Specification and User Manual FFD 2.5" Ultra ATA Flash Disk 41-PS-0104-00 Rev. 1.0
4.6.1.8 Sanitizing Based on DoD 5220.22-M
The USA DoD 5220.22-M National Industrial Security Program Operating Manual (NISPOM),
January 1995, specifies the sanitization processes for each media type (in order to be considered
declassified) in Chapter 8, Automated Information System Security. For Flash EPROM media
type, the sanitize process is as follows:
• “Overwrite all addressable location with a single character.”
Then
• “Perform a full chip erase as per manufacturer’s data sheet.”
The Ultra ATA complies with the above requirement, as described in Table 9.
4.6.1.9 Sanitizing Based on NSA Manual 130-2
The USA National Security Agency (NSA) specifies the procedure for sanitizing semiconductor
memory devices in its 130-2 Media Declassification and Destruction Manual (Paragraph 5,
Section 7). In the updated document version dated November 2000 Section 4.6c indicates the
procedure for sanitizing EEPROM:
• “Overwriting all locations with a pseudo-random pattern twice”.
Then
• “Overwriting all locations with a known pattern”.
The Ultra ATA complies with the above requirement, as described in Table 9.
4.6.1.10 Sanitizing Based on USA Air Force AFSSI 5020
The USA Air Force System Security Instruction (AFSSI) 5020, dated 20 August, 1996, specifies
the procedure for sanitizing confidential media. Chapter 5, Semiconductor Devices, describes the
security procedure for all types of semiconductor media. In Paragraph 5.3, the procedure for
sanitizing flash memory is described as follows:
• “Pulsing the erase control gate and verifying the erasure”.
Then
• “Overwrite all bit locations with arbitrary unclassified data”.
The Ultra ATA complies with the above requirement, as described in Table 9.
4.6.1.11 Sanitizing (Purging) Based on USA Army Regulation 380-19
The USA Army Regulation 380-19, Information Systems Security (ISS), effective 27 March,
1998, provides the security requirements for systems processing Special Access Program (SAP)
information and describes the ISS policy as it applies to security in hardware, software
procedures, telecommunication, personal use, physical environment, networks and firmware.
Section VII, Automated Information System Media, Section 2-20, describes cleaning, purging,
declassifying and destroying media. Appendix F-2 describes the following for sanitizing flash
EPROM (FEPROM):
• “Overwrite all location with a random character, a specific character, then its complement”
Then