Equipment Retirement Recommendations
Consider the following list of guidelines when you develop a security policy for your site. Also, refer to NIST 800-88r1.
-
Do not re-purpose a system with sensitive data to a network that carries less sensitive data.
-
Clear and purge hardware disks before destroying them.
-
For hardware disk purging methods, see Managing Devices in Oracle Solaris 11.4.
-
For scrubbing a USB, run the
dd
command several times. You have a couple of options:# dd if=/dev/zero of=/dev/sdx iflag=nocache oflag=direct bs=4096 # dd if=/dev/urandom of=/dev/sdx iflag=nocache oflag=direct bs=4096
-
For scrubbing solid state devices (SSDs), obtain OS-specific secure erase utilities from the vendor of your SSDs. You can also use a third-party scrubbing application, such as the
sg_sanitize
(8) utility.
-
-
Forbid the use of flash drives and USBs that could carry sensitive information off-site.