- Source: Infosec Standard 5
HMG 5.180.24.3/info/infosec" target="_blank">Infosec 5.180.24.3/info/standard" target="_blank">Standard 5, or IS5, is a data destruction 5.180.24.3/info/standard" target="_blank">standard used by the British government.
Context
IS5 is part of a larger family of IT security standards published by CESG; it is referred to by the more general 5.180.24.3/info/infosec" target="_blank">Infosec 5.180.24.3/info/standard" target="_blank">Standard No.1. IS5 is similar to DOD 5220.22-M (used in the USA).
Requirements
IS5 sets a wide range of requirements—not just the technical detail of overwriting data, but also the policies and processes that organisations should have in place, to ensure that media are disposed of securely. IS5 also touches on risk management accreditation, because secure reuse and disposal of media is an important control for organisations handling high-impact data. It's not sufficient just to sanitise media; the sanitisation should also be auditable, and records must be kept.
IS5 defines two different levels of overwriting:
Baseline overwriting of data involves one pass, overwriting every sector of the storage medium once with zeros.
Enhanced overwriting involves three passes; each sector is overwritten first with 1s, then with 0s, and then with randomly generated 1s and 0s.
Regardless of which level is used, verification is needed to ensure that overwriting was successful.
Apart from overwriting, other methods could be used, such as degaussing, or physical destruction of the media. With some inexpensive media, destruction and replacement may be cheaper than sanitisation followed by reuse. ATA Secure Erase is not approved. Different methods apply to different media, ranging from paper to CDs to mobile phones.
The choice of method affects reusability. Four different outcomes are considered:
Reuse of media in a similarly secure environment;
Reuse of media in a less-secure environment (accredited at a lower IL);
Reuse anywhere (i.e. an untrusted or unknown environment);
Destruction.
Stricter requirements apply to data with a stronger protective marking or IL. In some cases, media at or above IL4 / CONFIDENTIAL may have to be handled at a secure site, such as a List X site.