Probably too late for consideration at this point, but there are Enterprise Class SSDs available with DoD/NSA certified/approved self encryption capability. The concept is that encryption is a hardware feature of the drive, when you want to dispose of it, you throw away the key. This allows vendors to receive broken drives back from GOV/MIL clients securely so that failure methods can be researched. Dell and EMC have been presenting this to us at storage briefs for a couple of years now. --Sean On Thu, May 10, 2018 at 8:00 AM <centos-request@xxxxxxxxxx> wrote: > From: m.roth@xxxxxxxxx > To: CentOS mailing list <centos@xxxxxxxxxx> > Cc: > Bcc: > Date: Wed, 9 May 2018 11:35:21 -0400 > Subject: Re: OT: hardware: sanitizing a dead SSD? > James Szinger wrote: > > Disclaimer: My $dayjob is with a government contractor, but I am speaking > > as private citizen. > > > > Talk to your organization's computer security people. They will have a > > standard procedure for getting rid of dead disks. We on the internet > > can't > know what they are. I'm betting it involves some degree of > paperwork. > > > > Around here, I give the disks to my local computer support who in turn > > give them the institutional disk destruction team. I also zero-fill the > disk > > if possible, but that's not an official requirement. The disk remains > > sensitive until the process is complete. > > > Federal contractor here, too. (I'm the OP). For disks that work, shred or > DBAN is what we use. For dead disks, we do the paperwork, and get them > deGaussed. SSD's are a brand new issue. We haven't had to deal with them > yet, but it's surely coming, so we might as well figure it out now. > > mark > > _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx https://lists.centos.org/mailman/listinfo/centos