DRAM Data Remanence
   HOME

TheInfoList



OR:

Data remanence is the residual representation of
digital data Digital data, in information theory and information systems, is information represented as a string of Discrete mathematics, discrete symbols, each of which can take on one of only a finite number of values from some alphabet (formal languages ...
that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal
file deletion File deletion is the removal of a file from a computer's file system. All operating systems include commands for deleting files ( rm on Unix and Linux, era in CP/M and DR-DOS, del/erase in MS-DOS/ PC DOS, DR-DOS, Microsoft Windows etc.). Fil ...
operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the
storage media Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA and DNA are cons ...
that allow previously written data to be recovered. Data remanence may make inadvertent disclosure of
sensitive information Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can ...
possible should the storage media be released into an uncontrolled environment (''e.g.'', thrown in the bin (trash) or lost). Various techniques have been developed to counter data remanence. These techniques are classified as clearing, purging/sanitizing, or
destruction Destruction may refer to: Concepts * Destruktion, a term from the philosophy of Martin Heidegger * Destructive narcissism, a pathological form of narcissism * Self-destructive behaviour, a widely used phrase that ''conceptualises'' certain kin ...
. Specific methods include overwriting,
degaussing Degaussing, or deperming, is the process of decreasing or eliminating a remnant magnetic field. It is named after the gauss, a unit of magnetism, which in turn was named after Carl Friedrich Gauss. Due to magnetic hysteresis, it is generally not ...
,
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
, and media destruction. Effective application of countermeasures can be complicated by several factors, including media that are inaccessible, media that cannot effectively be erased, advanced storage systems that maintain histories of data throughout the data's life cycle, and persistence of data in memory that is typically considered volatile. Several
standards Standard may refer to: Symbols * Colours, standards and guidons, kinds of military signs * Standard (emblem), a type of a large symbol or emblem used for identification Norms, conventions or requirements * Standard (metrology), an object t ...
exist for the secure removal of data and the elimination of data remanence.


Causes

Many
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
s,
file manager A file manager or file browser is a computer program that provides a user interface to manage computer files, files and folder (computing), folders. The most common Computer file#Operations, operations performed on files or groups of files incl ...
s, and other software provide a facility where a file is not immediately deleted when the user requests that action. Instead, the file is moved to a holding area (i.e. the "trash"), making it easy for the user to undo a mistake. Similarly, many software products automatically create backup copies of files that are being edited, to allow the user to restore the original version, or to recover from a possible crash (''
autosave Autosave is a saving function in many computer applications and video games which automatically saves the current changes or progress in the program or game, intending to prevent data loss should the user be otherwise prevented from doing so manu ...
'' feature). Even when an explicit deleted file retention facility is not provided or when the user does not use it, operating systems do not actually remove the contents of a file when it is deleted unless they are aware that explicit erasure commands are required, like on a
solid-state drive A solid-state drive (SSD) is a type of solid-state storage device that uses integrated circuits to store data persistently. It is sometimes called semiconductor storage device, solid-state device, or solid-state disk. SSDs rely on non- ...
. (In such cases, the operating system will issue the
Serial ATA SATA (Serial AT Attachment) is a computer bus interface that connects host adapter, host bus adapters to mass storage devices such as hard disk drives, optical drives, and solid-state drives. Serial ATA succeeded the earlier Parallel ATA (PAT ...
TRIM Trim or TRIM may refer to: Cutting * Cutting or trimming small pieces off something to remove them ** Book trimming, a stage of the publishing process ** Pruning, trimming as a form of pruning often used on trees Decoration * Trim (sewing), or ...
command or the
SCSI Small Computer System Interface (SCSI, ) is a set of standards for physically connecting and transferring data between computers and peripheral devices, best known for its use with storage devices such as hard disk drives. SCSI was introduced ...
UNMAP command to let the drive know to no longer maintain the deleted data.) Instead, they simply remove the file's entry from the file system directory because this requires less work and is therefore faster, and the contents of the file—the actual data—remain on the
storage medium Data storage is the recording (storing) of information (data) in a storage medium. Handwriting, phonographic recording, magnetic tape, and optical discs are all examples of storage media. Biological molecules such as RNA and DNA are con ...
. The data will remain there until the
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
reuses the space for new data. In some systems, enough filesystem
metadata Metadata (or metainformation) is "data that provides information about other data", but not the content of the data itself, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive ...
are also left behind to enable easy
undeletion Undeletion is a feature for restoring computer files which have been removed from a file system by file deletion. Deleted data can be recovered on many file systems, but not all file systems provide an undeletion feature. Recovering data with ...
by commonly available
utility software Utility software is a program specifically designed to help manage and tune system or application software. It is used to support the computer infrastructure - in contrast to application software, which is aimed at directly performing tasks that b ...
. Even when undelete has become impossible, the data, until it has been overwritten, can be read by software that reads
disk sector In computer disk storage, a sector is a subdivision of a track on a magnetic disk or optical disc. For most disks, each sector stores a fixed amount of user-accessible data, traditionally 512 bytes for hard disk drives (HDDs), and 2048 byt ...
s directly.
Computer forensics Computer forensics (also known as computer forensic science) is a branch of digital forensics, digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital me ...
often employs such software. Likewise, reformatting, repartitioning, or reimaging a system is unlikely to write to every area of the disk, though all will cause the disk to appear empty or, in the case of reimaging, empty except for the files present in the image, to most software. Finally, even when the storage media is overwritten, physical properties of the media may permit recovery of the previous contents. In most cases however, this recovery is not possible by just reading from the storage device in the usual way, but requires using laboratory techniques such as disassembling the device and directly accessing/reading from its components. below gives further explanations for causes of data remanence.


Countermeasures

There are three levels commonly recognized for eliminating remnant data:


Clearing

Clearing is the removal of sensitive data from storage devices in such a way that there is assurance that the data may not be reconstructed using normal system functions or software file/data recovery utilities. The data may still be recoverable, but not without special laboratory techniques. (542 KB) Clearing is typically an administrative protection against accidental disclosure within an organization. For example, before a
hard drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
is re-used within an organization, its contents may be cleared to prevent their accidental disclosure to the next user.


Purging

Purging or sanitizing is the physical rewrite of sensitive data from a system or storage device done with the specific intent of rendering the data unrecoverable at a later time. Purging, proportional to the sensitivity of the data, is generally done before releasing media beyond control, such as before discarding old media, or moving media to a computer with different security requirements.


Destruction

The storage media is made unusable for conventional equipment. Effectiveness of destroying the media varies by medium and method. Depending on recording density of the media, and/or the destruction technique, this may leave data recoverable by laboratory methods. Conversely, destruction using appropriate techniques is the most secure method of preventing retrieval.


Specific methods


Overwriting

A common method used to counter data remanence is to overwrite the storage media with new data. This is often called wiping or shredding a disk or file, by
analogy Analogy is a comparison or correspondence between two things (or two groups of things) because of a third element that they are considered to share. In logic, it is an inference or an argument from one particular to another particular, as oppose ...
to common methods of destroying print media, although the mechanism bears no similarity to these. Because such a method can often be implemented in
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
alone, and may be able to selectively target only part of the media, it is a popular, low-cost option for some applications. Overwriting is generally an acceptable method of clearing, as long as the media is writable and not damaged. The simplest overwrite technique writes the same data everywhere—often just a pattern of all zeros. At a minimum, this will prevent the data from being retrieved simply by reading from the media again using standard system functions. The
UEFI Unified Extensible Firmware Interface (UEFI, as an acronym) is a Specification (technical standard), specification for the firmware Software architecture, architecture of a computing platform. When a computer booting, is powered on, the UEFI ...
in modern machines may offer a ATA class disk erase function as well. The ATA-6 standard governs secure erases specifications.
Bitlocker BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard ...
is whole disk encryption and illegible without the key. Writing a fresh GPT allows a new file system to be established. Blocks will set empty but LBA read is illegible. New data will be unaffected and work fine. In an attempt to counter more advanced data recovery techniques, specific overwrite patterns and multiple passes have often been prescribed. These may be generic patterns intended to eradicate any trace signatures; an example is the seven-pass pattern , , , , , , , sometimes erroneously attributed to US standard DOD 5220.22-M. One challenge with overwriting is that some areas of the disk may be
inaccessible Inaccessible Island is a volcanic island located in the South Atlantic Ocean, south-west of Tristan da Cunha. Its highest point, Swale's Fell, reaches , and the island is in area. The volcano was last active approximately one million years a ...
, due to media degradation or other errors. Software overwrite may also be problematic in high-security environments, which require stronger controls on data commingling than can be provided by the software in use. The use of advanced storage technologies may also make file-based overwrite ineffective (see the related discussion below under ). There are specialized machines and software that are capable of doing overwriting. The software can sometimes be a standalone operating system specifically designed for data destruction. There are also machines specifically designed to wipe hard drives to the department of defense specifications DOD 5220.22-M. Writing zero to each block on hard disks and SSDs has the advantage of affording the firmware to deploy spare blocks when bad blocks are identified. Bitlocker has the advantage that data is illegible without the key. Seatools and other tools can erase disks with zero which is typical to revive old consumer class disks but they can wipe server disks albeit slowly. Modern 28TB and larger disks have an enormous number of LBA48 blocks. 40TB and 60TB disks will take proportionately longer times to wipe.


Feasibility of recovering overwritten data

Peter Gutmann investigated data recovery from nominally overwritten media in the mid-1990s. He suggested magnetic force microscopy may be able to recover such data, and developed specific patterns, for specific drive technologies, designed to counter such. These patterns have come to be known as the Gutmann method. Gutmann's belief in the possibility of data recovery is based on many questionable assumptions and factual errors that indicate a low level of understanding of how hard drives work. Daniel Feenberg, an economist at the private
National Bureau of Economic Research The National Bureau of Economic Research (NBER) is an American private nonprofit research organization "committed to undertaking and disseminating unbiased economic research among public policymakers, business professionals, and the academic co ...
, claims that the chances of overwritten data being recovered from a modern hard drive amount to "urban legend". He also points to the " -minute gap"
Rose Mary Woods Rose Mary Woods (December 26, 1917 – January 22, 2005) was Richard Nixon's secretary from his days in Congress in 1951 through the end of his political career. Before H. R. Haldeman and John Ehrlichman became the operators of Nixon's pr ...
created on a tape of
Richard Nixon Richard Milhous Nixon (January 9, 1913April 22, 1994) was the 37th president of the United States, serving from 1969 until Resignation of Richard Nixon, his resignation in 1974. A member of the Republican Party (United States), Republican ...
discussing the
Watergate break-in The Watergate scandal was a major political scandal in the United States involving the administration of President Richard Nixon. The scandal began in 1972 and ultimately led to Nixon's resignation in 1974, in August of that year. It revol ...
. Erased information in the gap has not been recovered, and Feenberg claims doing so would be an easy task compared to recovery of a modern high density digital signal. As of November 2007, the
United States Department of Defense The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
considers overwriting acceptable for clearing magnetic media within the same security area/zone, but not as a sanitization method. Only
degaussing Degaussing, or deperming, is the process of decreasing or eliminating a remnant magnetic field. It is named after the gauss, a unit of magnetism, which in turn was named after Carl Friedrich Gauss. Due to magnetic hysteresis, it is generally not ...
or physical destruction is acceptable for the latter. On the other hand, according to the 2014
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
Special Publication 800-88 Rev. 1 (p. 7): "For storage devices containing ''magnetic'' media, a single overwrite pass with a fixed pattern such as binary zeros typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data." An analysis by Wright et al. of recovery techniques, including magnetic force microscopy, also concludes that a single wipe is all that is required for modern drives. They point out that the long time required for multiple wipes "has created a situation where many organizations ignore the issue ltogether– resulting in data leaks and loss."


Degaussing

Degaussing Degaussing, or deperming, is the process of decreasing or eliminating a remnant magnetic field. It is named after the gauss, a unit of magnetism, which in turn was named after Carl Friedrich Gauss. Due to magnetic hysteresis, it is generally not ...
is the removal or reduction of a magnetic field of a disk or drive, using a device called a degausser that has been designed for the media being erased. Applied to
magnetic media Magnetic storage or magnetic recording is the storage of data on a magnetized medium. Magnetic storage uses different patterns of magnetisation in a magnetizable material to store data and is a form of non-volatile memory. The information is acc ...
, degaussing may purge an entire media element quickly and effectively. Degaussing often renders
hard disk A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
s inoperable, as it erases low-level formatting that is only done at the factory during manufacturing. In some cases, it is possible to return the drive to a functional state by having it serviced at the manufacturer. However, some modern degaussers use such a strong magnetic pulse that the motor that spins the platters may be destroyed in the degaussing process, and servicing may not be cost-effective. Degaussed computer tape such as DLT can generally be reformatted and reused with standard consumer hardware. In some high-security environments, one may be required to use a degausser that has been approved for the task. For example, in US government and military jurisdictions, one may be required to use a degausser from the
NSA The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
's "Evaluated Products List".


Encryption

Encrypting In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
data before it is stored on the media may mitigate concerns about data remanence. If the
decryption key A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
is strong and carefully controlled, it may effectively make any data on the media unrecoverable. Even if the key is stored on the media, it may prove easier or quicker to overwrite just the key, versus the entire disk. This process is called
crypto-shredding Crypto-shredding or crypto erase (cryptographic erasure) is the practice of rendering encrypted data unusable by deliberately deleting or overwriting the encryption keys: assuming the key is not later recovered and the encryption is not broken, the ...
. Encryption may be done on a file-by-file basis, or on the whole disk.
Cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) ...
s are one of the few possible methods for subverting a full-disk encryption method, as there is no possibility of storing the plain text key in an unencrypted section of the medium. See the section Complications: Data in RAM for further discussion. Other
side-channel attack In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to ...
s (such as
keyloggers Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
, acquisition of a written note containing the decryption key, or rubber-hose cryptanalysis) may offer a greater chance of success, but do not rely on weaknesses in the cryptographic method employed. As such, their relevance for this article is minor.


Media destruction

Thorough destruction of the underlying storage media is the most certain way to counter data remanence. However, the process is generally time-consuming, cumbersome, and may require extremely thorough methods, as even a small fragment of the media may contain large amounts of data. Specific destruction techniques include: * Physically breaking the media apart (e.g., by grinding or shredding) * Chemically altering the media into a non-readable, non-reverse-constructible state (e.g., through
incineration Incineration is a waste treatment process that involves the combustion of substances contained in waste materials. Industrial plants for waste incineration are commonly referred to as waste-to-energy facilities. Incineration and other high ...
or exposure to
caustic Caustic most commonly refers to: * Causticity, the property of being able to corrode organic tissue ** Sodium hydroxide, sometimes called ''caustic soda'' ** Potassium hydroxide, sometimes called ''caustic potash'' ** Calcium oxide, sometimes cal ...
/
corrosive Corrosion is a natural process that converts a refined metal into a more chemically stable oxide. It is the gradual deterioration of materials (usually a metal) by chemical or electrochemical reaction with their environment. Corrosion engine ...
chemicals) *
Phase transition In physics, chemistry, and other related fields like biology, a phase transition (or phase change) is the physical process of transition between one state of a medium and another. Commonly the term is used to refer to changes among the basic Sta ...
(e.g., liquefaction or vaporization of a solid disk) * For magnetic media, raising its temperature above the
Curie point In physics and materials science, the Curie temperature (''T''C), or Curie point, is the temperature above which certain materials lose their magnet, permanent magnetic properties, which can (in most cases) be replaced by magnetization, induced ...
* For many electric/electronic volatile and non-volatile storage media, exposure to electromagnetic fields greatly exceeding safe operational specifications (e.g., high-
voltage Voltage, also known as (electrical) potential difference, electric pressure, or electric tension, is the difference in electric potential between two points. In a Electrostatics, static electric field, it corresponds to the Work (electrical), ...
electric current or high-amplitude
microwave Microwave is a form of electromagnetic radiation with wavelengths shorter than other radio waves but longer than infrared waves. Its wavelength ranges from about one meter to one millimeter, corresponding to frequency, frequencies between 300&n ...
or ionizing radiation)


Complications


Inaccessible media areas

Storage media may have areas which become inaccessible by normal means. For example, magnetic disks may develop new
bad sector Bad Sector is an ambient/noise project formed in 1992 in Tuscany, Italy by Massimo Magrini. While working at the Computer Art Lab of ISTI in Pisa (one of the CNR institutes), he developed original gesture interfaces that he uses in live pe ...
s after data has been written, and tapes require inter-record gaps. Modern
hard disk A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating hard disk drive platter, pla ...
s often feature reallocation of marginal sectors or tracks, automated in a way that the
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
would not need to work with it. The problem is especially significant in
solid-state drives A solid-state drive (SSD) is a type of solid-state storage device that uses integrated circuits to store data persistently. It is sometimes called semiconductor storage device, solid-state device, or solid-state disk. SSDs rely on non-vo ...
(SSDs) that rely on relatively large relocated bad block tables. Attempts to counter data remanence by overwriting may not be successful in such situations, as data remnants may persist in such nominally inaccessible areas.


Advanced storage systems

Data storage systems with more sophisticated features may make overwrite ineffective, especially on a per-file basis. For example,
journaling file system A journaling file system is a file system that keeps track of changes not yet committed to the file system's main part by recording the goal of such changes in a data structure known as a " journal", which is usually a circular log. In the ev ...
s increase the integrity of data by recording write operations in multiple locations, and applying transaction-like semantics; on such systems, data remnants may exist in locations "outside" the nominal file storage location. Some file systems also implement
copy-on-write Copy-on-write (COW), also called implicit sharing or shadowing, is a resource-management technique used in programming to manage shared data efficiently. Instead of copying data right away when multiple programs use it, the same data is shared ...
or built-in
revision control Version control (also known as revision control, source control, and source code management) is the software engineering practice of controlling, organizing, and tracking different versions in history of computer files; primarily source code ...
, with the intent that writing to a file never overwrites data in-place. Furthermore, technologies such as
RAID RAID (; redundant array of inexpensive disks or redundant array of independent disks) is a data storage virtualization technology that combines multiple physical Computer data storage, data storage components into one or more logical units for th ...
and anti-fragmentation techniques may result in file data being written to multiple locations, either by design (for
fault tolerance Fault tolerance is the ability of a system to maintain proper operation despite failures or faults in one or more of its components. This capability is essential for high-availability, mission-critical, or even life-critical systems. Fault t ...
), or as data remnants.
Wear leveling Wear leveling (also written as wear levelling) is a technique Wear leveling techniques for flash memory systems. for prolonging the service life of some kinds of erasable computer storage media, such as flash memory, which is used in solid-state d ...
can also defeat data erasure, by relocating blocks between the time when they are originally written and the time when they are overwritten. For this reason, some security protocols tailored to operating systems or other software featuring automatic wear leveling recommend conducting a free-space wipe of a given drive and then copying many small, easily identifiable "junk" files or files containing other nonsensitive data to fill as much of that drive as possible, leaving only the amount of free space necessary for satisfactory operation of system hardware and software. As storage and system demands grow, the "junk data" files can be deleted as necessary to free up space; even if the deletion of "junk data" files is not secure, their initial nonsensitivity reduces to near zero the consequences of recovery of data remanent from them.


Optical media

As
optical media An optical disc is a flat, usuallyNon-circular optical discs exist for fashion purposes; see shaped compact disc. disc-shaped object that stores information in the form of physical variations on its surface that can be read with the aid o ...
are not magnetic, they are not erased by conventional
degaussing Degaussing, or deperming, is the process of decreasing or eliminating a remnant magnetic field. It is named after the gauss, a unit of magnetism, which in turn was named after Carl Friedrich Gauss. Due to magnetic hysteresis, it is generally not ...
. Write-once optical media (
CD-R CD-R (Compact disc-recordable) is a digital media, digital optical disc data storage device, storage format. A CD-R disc is a compact disc that can only be Write once read many, written once and read arbitrarily many times. CD-R discs (CD-Rs) ...
,
DVD-R DVD recordable and DVD rewritable are a collection of optical disc formats that can be written to by a DVD recorder and by computers using a DVD writer. The "recordable" discs are write-once read-many (WORM) media, where as "rewritable" discs a ...
, etc.) also cannot be purged by overwriting. Rewritable optical media, such as
CD-RW RW (Compact Disc-Rewritable) is a digital media, digital optical disc data storage device, storage format introduced by Ricoh in 1997. A CD-RW compact disc (CD-RWs) can be written, read, erased, and re-written. CD-RWs, as opposed to CDs, r ...
and
DVD-RW DVD recordable and DVD rewritable are a collection of optical disc formats that can be written to by a DVD recorder and by computers using a DVD writer. The "recordable" discs are write-once read-many (WORM) media, where as "rewritable" discs a ...
, may be receptive to overwriting. Methods for successfully sanitizing optical discs include delaminating or abrading the metallic data layer, shredding, incinerating, destructive electrical arcing (as by exposure to microwave energy), and submersion in a polycarbonate solvent (e.g.,
acetone Acetone (2-propanone or dimethyl ketone) is an organic compound with the chemical formula, formula . It is the simplest and smallest ketone (). It is a colorless, highly Volatile organic compound, volatile, and flammable liquid with a charact ...
).


Data on solid-state drives

Research from the Center for Magnetic Recording and Research, University of California, San Diego has uncovered problems inherent in erasing data stored on
solid-state drive A solid-state drive (SSD) is a type of solid-state storage device that uses integrated circuits to store data persistently. It is sometimes called semiconductor storage device, solid-state device, or solid-state disk. SSDs rely on non- ...
s (SSDs). Researchers discovered three problems with file storage on SSDs: Solid-state drives, which are flash-based, differ from hard-disk drives in two ways: first, in the way data is stored; and second, in the way the algorithms are used to manage and access that data. These differences can be exploited to recover previously erased data. SSDs maintain a layer of indirection between the logical addresses used by computer systems to access data and the internal addresses that identify physical storage. This layer of indirection hides idiosyncratic media interfaces and enhances SSD performance, reliability, and lifespan (see
wear leveling Wear leveling (also written as wear levelling) is a technique Wear leveling techniques for flash memory systems. for prolonging the service life of some kinds of erasable computer storage media, such as flash memory, which is used in solid-state d ...
), but it can also produce copies of the data that are invisible to the user and that a sophisticated attacker could recover. For sanitizing entire disks, sanitize commands built into the SSD hardware have been found to be effective when implemented correctly, and software-only techniques for sanitizing entire disks have been found to work most, but not all, of the time. In testing, none of the software techniques were effective for sanitizing individual files. These included well-known algorithms such as the Gutmann method, US DoD 5220.22-M, RCMP TSSIT OPS-II, Schneier 7 Pass, and Secure Empty Trash on macOS (a feature included in versions OS X 10.3-10.9). The
TRIM Trim or TRIM may refer to: Cutting * Cutting or trimming small pieces off something to remove them ** Book trimming, a stage of the publishing process ** Pruning, trimming as a form of pruning often used on trees Decoration * Trim (sewing), or ...
feature in many SSD devices, if properly implemented, will eventually erase data after it is deleted, but the process can take some time, typically several minutes. Many older operating systems do not support this feature, and not all combinations of drives and operating systems work.


Data in RAM

Data remanence has been observed in
static random-access memory Static random-access memory (static RAM or SRAM) is a type of random-access memory (RAM) that uses latching circuitry (flip-flop) to store each bit. SRAM is volatile memory; data is lost when power is removed. The ''static'' qualifier diffe ...
(SRAM), which is typically considered volatile (''i.e.'', the contents degrade with loss of external power). In one study,
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differe ...
was observed even at room temperature. Data remanence has also been observed in
dynamic random-access memory Dynamics (from Greek language, Greek δυναμικός ''dynamikos'' "powerful", from δύναμις ''dynamis'' "power (disambiguation), power") or dynamic may refer to: Physics and engineering * Dynamics (mechanics), the study of forces and t ...
(DRAM). Modern DRAM chips have a built-in self-refresh module, as they not only require a power supply to retain data, but must also be periodically refreshed to prevent their data contents from fading away from the capacitors in their integrated circuits. A study found data remanence in DRAM with data retention of seconds to minutes at room temperature and "a full week without refresh when cooled with liquid nitrogen." The study authors were able to use a
cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) ...
to recover cryptographic
keys Key, Keys, The Key or The Keys may refer to: Common uses * Key (cryptography), a piece of information needed to encode or decode a message * Key (instrument), a component of a musical instrument * Key (lock), a device used to operate a lock * ...
for several popular
full disk encryption Disk encryption is a technology which protects information by converting it into code that cannot be deciphered easily by unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data tha ...
systems, including Microsoft
BitLocker BitLocker is a full volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for entire volumes. By default, it uses the Advanced Encryption Standard ...
, Apple
FileVault FileVault is a disk encryption program in Mac OS X 10.3 Panther (2003) and later. It performs on-the-fly encryption with volumes on Mac computers. Versions and key features FileVault was introduced with Mac OS X 10.3 Panther, and could o ...
,
dm-crypt dm-crypt is a transparent block device encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. It is part of the device mapper (dm) infrastructure, and uses cryptographic routines from the kernel's Crypto API. Unlike ...
for Linux, and
TrueCrypt TrueCrypt is a discontinued source-available freeware utility software, utility used for on-the-fly encryption (OTFE). It can create a virtual encrypted disk within a file, encrypt a Disk partitioning, partition, or encrypt the whole Data storag ...
. Despite some memory degradation, authors of the above described study were able to take advantage of redundancy in the way keys are stored after they have been expanded for efficient use, such as in key scheduling. The authors recommend that computers be powered down, rather than be left in a "
sleep Sleep is a state of reduced mental and physical activity in which consciousness is altered and certain Sensory nervous system, sensory activity is inhibited. During sleep, there is a marked decrease in muscle activity and interactions with th ...
" state, when not in physical control of the owner. In some cases, such as certain modes of the software program BitLocker, the authors recommend that a boot password or a key on a removable USB device be used.
TRESOR TRESOR (recursive acronym for "TRESOR Runs Encryption Securely Outside RAM", and also the German word for a safe) is a Linux kernel patch which provides encryption using only the CPU to defend against cold boot attacks on computer systems by perf ...
is a
kernel Kernel may refer to: Computing * Kernel (operating system), the central component of most operating systems * Kernel (image processing), a matrix used for image convolution * Compute kernel, in GPGPU programming * Kernel method, in machine learnin ...
patch for Linux specifically intended to prevent
cold boot attack In computer security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer's random-access memory (RAM) ...
s on RAM by ensuring that encryption keys are not accessible from user space and are stored in the CPU rather than system RAM whenever possible. Newer versions of the disk encryption software
VeraCrypt VeraCrypt is a free and open-source utility for on-the-fly encryption (OTFE). The software can create a virtual encrypted disk that works just like a regular disk but within a file. It can also encrypt a partition or (in Windows) the entire sto ...
can encrypt in-RAM keys and passwords on 64-bit Windows.


Standards

; Australia * ASD ISM 2014, ''Australian Government Information Security Manual'', 2014 ; Canada *
RCMP The Royal Canadian Mounted Police (RCMP; , GRC) is the Law enforcement in Canada, national police service of Canada. The RCMP is an agency of the Government of Canada; it also provides police services under contract to 11 Provinces and terri ...
B2-002, ''IT Media Overwrite and Secure Erase Products'', May 2009 *
Communications Security Establishment The Communications Security Establishment (CSE; , ''CST''), formerly (from 2008-2014) called the Communications Security Establishment Canada (CSEC), is the Government of Canada's national cryptologic agency. It is responsible for foreign signal ...
''Clearing and Declassifying Electronic Data Storage Devices'', July 2006 ; New Zealand * GCSB NZISM 2016, ''New Zealand Information Security Manual v2.5'', July 2016 * NZSIS PSM 2009, ''Protective Security Manual'' ; United Kingdom * Asset Disposal and Information Security Alliance (ADISA), ''ADISA IT Asset Disposal Security Standard'' ; United States *
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
Special Publication 800-88, ''Guidelines for Media Sanitization'', September 2006 * DoD 5220.22-M, ''National Industrial Security Program Operating Manual'' (NISPOM), February 2006 ** Current editions no longer contain any references to specific sanitization methods. Standards for sanitization are left up to the Cognizant Security Authority. ** Although the NISPOM text itself never described any specific methods for sanitization, past editions (1995 and 1997) with the
Defense Security Service Defense or defence may refer to: Tactical, martial, and political acts or groups * Defense (military), forces primarily intended for warfare * Civil defense, the organizing of civilians to deal with emergencies or enemy attacks * Defense indust ...
(DSS) ''Clearing and Sanitization Matrix''; includes Change 1, July 31, 1997.
did contain explicit sanitization methods within the Defense Security Service (DSS) ''Clearing and Sanitization Matrix'' inserted after Section 8-306. The DSS still provides this matrix and it continues to specify methods. As of the Nov 2007 edition of the matrix, overwriting is no longer acceptable for sanitization of magnetic media. Only
degaussing Degaussing, or deperming, is the process of decreasing or eliminating a remnant magnetic field. It is named after the gauss, a unit of magnetism, which in turn was named after Carl Friedrich Gauss. Due to magnetic hysteresis, it is generally not ...
(with an NSA approved degausser) or physical destruction is acceptable. *
Army An army, ground force or land force is an armed force that fights primarily on land. In the broadest sense, it is the land-based military branch, service branch or armed service of a nation or country. It may also include aviation assets by ...
AR380-19, ''Information Systems Security'', February 1998 replaced by AR 25-2 (Army Publishing Directorate, 2009) *
Air Force An air force in the broadest sense is the national military branch that primarily conducts aerial warfare. More specifically, it is the branch of a nation's armed services that is responsible for aerial warfare as distinct from an army aviati ...
AFSSI 8580, ''Remanence Security'', 17 November 2008 *
Navy A navy, naval force, military maritime fleet, war navy, or maritime force is the military branch, branch of a nation's armed forces principally designated for naval warfare, naval and amphibious warfare; namely, lake-borne, riverine, littoral z ...
NAVSO P5239-26, ''Remanence Security'', September 1993 *
IEEE The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines. The IEEE ...
2883, ''IEEE Standard for Sanitizing Storage'', August 2022


See also

*
Computer forensics Computer forensics (also known as computer forensic science) is a branch of digital forensics, digital forensic science pertaining to evidence found in computers and digital storage media. The goal of computer forensics is to examine digital me ...
*
Cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
*
Data erasure Data erasure (sometimes referred to as data clearing, data wiping, or data destruction) is a software-based method of data sanitization that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by ...
*
Data recovery In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, overwritten or formatted data from computer data storage#Secondary storage, secondary storage, removable media or Computer file, files, when ...
*
Electronic waste Electronic waste (or e-waste) describes discarded electrical or electronics, electronic devices. It is also commonly known as waste electrical and electronic equipment (WEEE) or end-of-life (EOL) electronics. Used electronics which are destined ...
*
Encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
*
File deletion File deletion is the removal of a file from a computer's file system. All operating systems include commands for deleting files ( rm on Unix and Linux, era in CP/M and DR-DOS, del/erase in MS-DOS/ PC DOS, DR-DOS, Microsoft Windows etc.). Fil ...
*
Forensic identification Forensic identification is the application of forensic science, or "forensics", and technology to identify specific objects from the trace evidence they leave, often at a crime scene or the scene of an accident. Forensic means "for the courts". Hu ...
* Gutmann method *
Memory scrambling A memory controller, also known as memory chip controller (MCC) or a memory controller unit (MCU), is a digital circuit that manages the flow of data going to and from a computer's main memory. When a memory controller is integrated into another ...
*
Palimpsest In textual studies, a palimpsest () is a manuscript page, either from a scroll or a book, from which the text has been scraped or washed off in preparation for reuse in the form of another document. Parchment was made of lamb, calf, or kid ski ...
*
Paper shredder A paper shredder is a mechanical device used to cut sheets of paper into either strips or fine particles. Government organizations, businesses, and private individuals use shredders to destroy private, confidential, or otherwise sensitive do ...
* Physical information security *
Plaintext In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms. This usually refers to data that is transmitted or stored unencrypted. Overview With the advent of comp ...
(security discussion) *
Remanence Remanence or remanent magnetization or residual magnetism is the magnetization left behind in a ferromagnetic material (such as iron) after an external magnetic field is removed. Colloquially, when a magnet is "magnetized", it has remanence. The ...
(magnetic retentivity) *
Sanitization (classified information) Redaction or sanitization is the process of removing information sensitivity, sensitive information from a document so that it may be distributed to a broader audience. It is intended to allow the selective disclosure of information. Typically, t ...
* Secure USB drive *
Zeroisation In cryptography, zeroisation (also spelled zeroization) is the practice of erasing sensitive parameters (electronically stored data, cryptographic keys, and critical security parameters) from a cryptographic module to prevent their disclosure if ...


References


Further reading

* (
Rainbow Series The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They were originally published by the U.S. Department of Defen ...
"Forrest Green Book")
Tutorial on Disk Drive Data Sanitization
Gordon Hughes, UCSD Center for Magnetic Recording Research, Tom Coughlin, Coughlin Associates {{DEFAULTSORT:Data Remanence Computer security Data erasure