Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009.

Slides:



Advertisements
Similar presentations
Chapter 7: Physical & Environmental Security
Advertisements

Electronics Stewardship Tim Hilton
Data Destruction and The Impact on Recycling. Data Breaches In 2012, over 26M records from 617 data breaches were made public Average costs: –$194 per.
FDCC Implementation Efforts at Idaho National Laboratory Justin Hansen NLIT 2009.
Data Security Audit October 13 th, 2010 Thompson School District.
Aspects of Electronic Waste Disposal Lawrence P. Hayes P.E. E-Waste Experts, Inc.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.
Welcome & Introductions Joanne Willis, OTR/L – Executive Director Alan Rust - ReBoot™ Reuse & Recycling Specialist TTF is a 501(c)3 nonprofit Designed.
This presentation will take a look at to prevent your information from being discovered by and investigator.
NOAA Computer/Hard Drive Sanitization Validation Form and PDA/Cell Phone Destruction Worksheet.
Media Sanitization  NIST Guidance  Terms Defined  When is media under/not under your control?  Flowchart for decision making  Spreadsheet of.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
IBM Energy & Environment © 2008 IBM Corporation Energy Efficiency in the Data Centre … and beyond Peter Richardson UK Green Marketing Leader.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
INDUSTRIAL & SYSTEMS ENGINEERING
You can run that from a USB Drive ? Portable Applications: the good, the bad and the ugly Jeff Gimbel © 2007.
More than just an end of life solution A Best Practice Solution for sanitizing hard drives during their entire lifecycle CRADLE REFRESHES  Storage transfers.
PMI Inventory Tracker™
10 Essential Security Measures PA Turnpike Commission.
Identify a few method to dispose of the hard drive of computers.
Equipment Surplus & Secure Media Destruction Michael Thorn, Data Security Specialist.
November 2009 Network Disaster Recovery October 2014.
National Property Management Association Disposing of Assets Containing Sensitive Information Kim Doner, CPPM SRA International.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Professional Development Plan Externship Contact Hours Tracking.
Information Security Technological Security Implementation and Privacy Protection.
Security Operations. 2 Domain Objectives Protection and Control of Data Processing Resources Media Management Backups and Recovery Change Control Privileged.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Linux Security Baseline Implementation Efforts at the INL Jason Miller NLIT 2009.
Hardware Support for Trustworthy Systems Ted Huffmire ACACES 2012 Fiuggi, Italy.
AHS COMPUTING Introduction to Computing. AHS Computing Personnel.
ELECTRONIC RECYCLING ELECTRONIC EQUIPMENT RECYCLING WEB CONFERENCING RECYCLED TONER CARTRIDGES.
HIPAA COMPLIANCE PROTECT INFORMATION INCREASE RECYCLING SAVE MONEY.
SOLUTIONS FOR THE EFFICIENT ENTERPRISE Sameer Garde Country GM,India.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D Lessons Learned: Certification and Accreditation.
Data Destruction Is it really gone? Donna Read Chris Parker Florida Gulf Coast ARMA Chapter April 2013.
Microsoft Office 2008 for Mac – Illustrated Unit C: Understanding File Management.
Records Management Presentation. Overview Directories for administrating health care information Integrated records management Making of new records Straight.
Computer Disposal Goes Green. Three billion units of consumer electronics potentially will become scrap between 2003 and That’s nine gadgets thrown.
Laboratory Software ProCal Calibration Software ProCal Track Management Software ProSales Pricing & quoting Software.
AN OVERVIEW OF ENERGY STAR Lisa Hopkinson University of Bradford.
Storing data on your computer & network. Storage devices Hardware Hard drive Flash drive Tape File server (HD) SAN NAS Software System software Windows.
Affordable Computerized Maintenance Management Solutions (CMMS) Gabi Miles Hach Company May 22, 2009.
Records Management: The Public Records Act, the Library of Virginia, and You Glenn Smith Records Management Analyst.
Wyse.com David Angwin Vice President, Field Marketing Managing mobility in a changing device landscape.
Lessons learned during Sandia’s encryption implementation NLIT 2009 May 2008 Sam Jones Matt Snitchler Desktop Technology Development Sandia is a multiprogram.
Internet2 AdvCollab Apps 1 Access Grid Vision To create virtual spaces where distributed people can work together. Challenges:
Physical Security Katie Parker and Robert Tribbia Katie Parker and Robert Tribbia Computer Security Computer Security Fall 2008 Fall 2008.
Buy It Now Surplus PC Pricing PLEASE CONTACT OUR SURPLUS SPECIALIST FOR AVAILABILITY WORTH ALLEN OR RYAN STRAUS
Introduction TO Network Administration
Disaster Recovery: Can Your Business Survive Data Loss? DR Strategies for Today and Tomorrow.
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Data Destruction Expanding Business Opportunities Dag Adamson LifeSpan Technology Recycling.
Evaluation of an E-Voting Device based on a Common Criteria Protection Profile Roland Vogt, DFKI GmbH Dr. Sönke Maseberg, datenschutz nord GmbH 8th ICCC,
Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved. Handbook of Informatics for Nurses and Healthcare.
C C Introduction to Tivoli Endpoint Manager 8.2 Joe Saylor Tivoli Endpoint Manager Solutions Architect.
Migration to Cloud and Data Center Moves/ Consolidation Security & Asset Disposition Case Studies DCM 11.1 Thursday May 2, 9:45–10:45am, Palm H Cindy Miller,
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
By: Mike Nazzario. What is a Data Center?  Facility used to house computer servers for remote storage  Sensitive Data  Warehouse – room with a couple.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Archive / Destruction / Disposal
At Greentek Solutions, we provide customized solutions
GES SYSTEM THE IMPORTANCE OF GES SYSTEM IN BUILDING
Ensuring the Quality and Best Use of Information
Wireless Workstation Revolution
Secondary Storage Devices
Presentation transcript:

Media Sanitization at the Idaho National Laboratory Jonathan Bates NLIT 2009

INL’s IT By the Numbers 12,000 IT Devices owned by INL 9,000 Devices on the Network 5,500 Desktop & Laptop Computers Operating Systems (85% Windows, 9% Mac, 6% Linux) Dell Shop (95% Windows Based Computers are Dell) Office Desktops – Dell Optiplex Laptops – Dell Latitude Engineering Workstations – Dell Precision

Role of IT in Managing End of Life Technology Control Costs – keep the end in mind Go Green – reduce, reuse, and recycle Protect the data!

Importance of Media Tracking Tracking – Documentation – Verification Linking data: chain of custody Verification reporting Label generation

Sanitization Processes Two Previous Sanitization Processes Clear media and re-use (3 pass overwrite) Purge (degauss)

Clearing and Reusing Pros – Media can be reused Cons – Increased management complexity = – Increased security risk

Pros – Fast purging of Magnetic Media Degaussing Pros and Cons Cons – Media appeared to be intact after degaussing – Time spent in tracking and labeling degaussed media – Stacked media on pallets had to be stored in open area due to space needs – Increased auditor visits because media appeared to be fit for use

Taking sanitization to the next level Changes needed to streamline our processes and tighten security – Reduce footprint – Reduce validation costs – Reduce time sanitizing media – Reduce time tracking media – Reduce security risk of data leakage

Our Solution… Destroy Drive Disintegrator – Compact: 5 feet wide x 9 feet long x 8 feet high – Can disintegrate 20 drives per hour – Automated self-feed feature – Reduces media to ¼ inch unrecognizable fragments – Destroyed 7,456 drives last year!

Challenges Disintegrator design is critical Mechanical Operational Maintenance Disintegrator vs. Shredder

Reduced Footprint Shredded material requires less space to store

Increased Physical Access Control Reduced footprint allowed for move to new facility to improve security – Work area is secured by cipher locks – Hard drives and other media that are pending destruction are stored in a security cage within the work area, accessible only by key

Tighter Integration with Property Management Educating Property Management and Disposal personnel on identifying types of equipment to be submitted for sanitization

Streamlined Tracking Need for continuous media tracking eliminated – All drive media destroyed Redeployed computers receive new hard drive

The Future Continual Improvement Evaluating… User-based or distributed processes Sanitization methods for different media types How is your lab sanitizing media?

Questions Jonathan Bates PC Redistribution Center Idaho National Laboratory