Term:Sanitization

From FISMApedia
Jump to: navigation, search

DSS Glossary

Sanitization (Purging)- Removal of information from the storage device such that data recovery using any known technique or analysis is prevented. Sanitization includes removal data from the storage device, as well as the removal of labels, markings, and activity logs. In general, laboratory techniques cannot retrieve data that has been sanitized/purged. The method of sanitization varies depending upon the storage device and may include actions such as degaussing, incineration, smelting, shredding, grinding, embossing, or chemical immersion.

GAO-09-232G

Sanitization - Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs.

NIST FIPS 200

Sanitization - Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. (CNSS Instruction 4009 Adapted) 8

NIST IR 7298

Sanitization - Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. SOURCE: SP 800-53; FIPS 200; CNSSI-4009 Adapted

NIST SP 800-18r1

Sanitization - Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. [CNSS Inst. 4009, Adapted]

NIST SP 800-53r3

Sanitization - A general term referring to the actions taken to render data written on media unrecoverable by both ordinary and, for some forms of sanitization, extraordinary means.

NSA IATF 3-1

Sanitization - The changing of content information in order to meet the requirements of the sensitivity level of the network to which the information is being sent.