What are the 3 methods of data sanitization?

Data sanitization is the process of completely removing the data stored on a memory device to make it unusable. The process is deliberate, permanent, and irreversible. As such, any device that undergoes data sanitization will no longer have usable residual data. Even if you use the most advanced forensic tools on the sanitized devices, you can no longer recover the data.

As the name implies, data sanitization can be likened to cleaning your home and getting rid of all things you no longer use. You can’t get the stuff you threw or gave away back no matter what you do.

Other interesting terms…

  • What is Data Modeling?
  • What is a Data Packet?

Read More about “Data Sanitization”

Data Sanitization Methods 

Data sanitization can be done in various ways, namely:

1. Physical Destruction

This data sanitization method involves physically shredding hard drives, laptops, mobile phones, and other storage media using a professional-grade mechanical shredder. You can also do it by degaussing or exposing the data to a magnetic field to neutralize it to the point that it can no longer be recovered. Note, though, that degaussing is only useful for hard disk drives (HDDs) but not solid-state drives (SSDs).

While physically destroying storage media is an effective method of data sanitization, it is discouraged since it can have detrimental effects on the environment.

2. Cryptographic Erasure

Cryptographic erasure involves using a built-in or deployed encryption software on a storage device. The software erases the key one needs to decrypt the data. Ideally, key erasure would render the data unreadable or unrecoverable because the decryption key is no longer available. While cryptographic erasure is an effective way of data sanitization, the data remains inside the storage device, and so the process may fail to comply with regulation orders.

3. Data Erasure

Data erasure, like cryptographic erasure, uses software to sanitize data. The process involves securely overwriting the information with zeroes and ones. Data erasure can be successful if it follows these criteria:

  • The software complies with industry and organizational requirements.
  • There is a way to verify if the overwriting process was done on the entire device.
  • There must also be a tamper-proof certificate that indicates that overwriting was successful.

In some cases, block erasure may also be done. In this process, the software targets only block addresses or specific places within the storage device, which removes only targeted data.

Among all three methods, data erasure is recognized as the best form of data sanitization. It has a validation process that assures the data owner that the information is no longer recoverable. It is also environmentally sound as the storage devices can still be resold. The downside, however, is that data erasure can take a while to accomplish.

It is common to confuse data sanitization with other processes that often only delete data but do not make it unrecoverable. Some of these practices include data deletion, reformatting, factory resetting, data wiping, file shredding, data clearing, data purging, and data destruction.


Data sanitization is critical in protecting highly sensitive data. Due to the implementation of the General Data Protection Regulation (GDPR), the process has become a necessary practice for organizations.

More from Techslang...

An effective data sanitization process lessens the chance that your organization's valuable data could be stolen or compromised, and enhances compliance.

As part of your data storage and retention activities, you occasionally must completely remove data from storage media, and might even destroy the media on which data is stored. Data sanitization is the process of totally and irreversibly destroying data on a storage device.

Media devices that you can sanitize include magnetic disks, flash memory devices, CDs and DVDs. If a device has been properly sanitized, there shouldn't be usable residual data, and even advanced forensic tools cannot recover any data. Data sanitization techniques include specialized software that erases data, specialized devices that connect to the storage media and erase the data and a process that physically destroys the media so you cannot recover data from the storage device.

Importance of data sanitization in backups

Once you no longer require backed-up data or its expiration date has passed, you must either archive or destroy it depending on your organization's data retention policies. If you store data on site, you might use various data sanitization techniques to fully destroy it, based on the storage medium. If possible, obtain a certificate of destruction, so that in the event of an IT organization audit, the auditor can examine and verify evidence of data destruction activities.

If you store data off site, such as in cloud backup storage, your cloud vendor must destroy your customer data for you. You must then verify that the data has been properly and fully destroyed and cannot be recovered. Before engaging with a cloud storage or other managed service provider, research what process it uses for data destruction and understand how the firm certifies complete destruction of data. An off-site data storage company's failure to certify data destruction means that data could possibly be recovered, especially if the storage vendor suffers a cyber attack that obtains access to customer data.

Standards and practices

ARMA International's book Contracted Destruction for Records and Information Media provides guidance on how to obtain data and media destruction services. Customers and data destruction vendors alike can use it.

The NIST Special Publication 800-88 Revision 1, Guidelines for Media Sanitization (February 2015), produced by the National Institute of Standards and Technology, also provides detailed guidance on sanitizing data storage media based on an organization's categorization of data confidentiality for information. It supports key provisions of another widely used NIST standard, SP 800-53, Recommended Security Controls for Federal Information Systems and Organizations.

Additional standards and regulations addressing data sanitization techniques include the following:

  • the General Data Protection Regulation (GDPR) in several sections, such as Article 17, Right to erasure (right to be forgotten);
  • PCI DSS (Payment Card Industry Data Security Standard) Sections 3.1, 3.2, 9.8.2 and 10.7;
  • ISO/IEC 27001, Information Security Management, Sections A.8.3.2, Disposal of media, and A.11.2.7, Secure disposal or reuse of equipment; and
  • New York State Cybersecurity Requirements of Financial Services Companies 23 NYCRR 500, Section 500.13, Limitations on Data Retention.

Importance of establishing a policy

Start by establishing a data destruction policy to complement your data retention policy. Data retention policies and procedures are specific requirements found in many current U.S. laws, such as the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA). A data destruction policy ensures that devices and media no longer being used have their contents securely removed, destroyed or overwritten, making it extremely difficult or impossible to later retrieve valuable data. Having a data destruction policy also reduces the likelihood of a data or privacy breach, thereby reducing the liability your organization could face as a result.

In addition to a data destruction policy, your organization should have formal documentation procedures confirming the process used to destroy the data and media. Most current legislation that requires data management policies and procedures also requires formal documentation of all data retention and destruction activities. This can provide evidence to the court that any data in question does not exist.

One of the key components in a data destruction policy and its associated destruction procedures is the technique used to securely destroy the data and storage media. Four techniques are regularly used:

  • Overwriting. Usually implemented in software, this process simply and securely overwrites the storage medium with new data. Known as wiping, it's as simple as writing the same data (e.g., all zeros and ones or a specific character pattern) everywhere on the media.
  • Degaussing. This technique electronically removes the magnetic field of a disk or drive using a device called a degausser. When used properly, degaussing renders a disk unusable. However, it may be possible for the manufacturer to reformat the disk at the factory.
  • Encryption. Typically used to secure data from unauthorized access, encryption also can be used to make it impossible to access data on a storage device. By encrypting all data stored on a device and using a very strong decryption key, access to the data can be effectively prevented. By destroying the encryption key, the encrypted data can be permanently made inaccessible.
  • Physical destruction. This technique is generally considered the most secure and permanent type of destruction method. The media must be thoroughly destroyed, as even a small piece of the disk may still contain data. Typical techniques include breaking the media apart via grinding or shredding; incinerating the media; applying corrosive chemicals (e.g., acids) to the disk surface; vaporizing or liquefying the media; or applying extremely high voltage to the media.

Relevant legislation

SOX requires organizations to have strict records retention policies and procedures in place, but it does not specify a particular data storage format. It requires corporate officers to institute internal controls on their information to ensure completeness, correctness and quick access. However, SOX also calls for accounting firms that audit publicly traded companies to keep related audit documents for no less than seven years after the completion of an audit. Violators can face up to $10 million in fines and 20 years in prison.

Similar to SOX legislation, HIPAA legislation focuses on protecting electronic personal health information. Data sanitization in HIPAA can be found in the Security Rule (Subpart C) in sections §164.306, Security standards; §164.308, Administrative safeguards; and §164.314, Organizational requirements.

Effective use of data sanitization techniques can minimize the chance of valuable data theft or compromise. Your organization can consider many options to permanently destroy data and media. With an official data sanitization policy in place, you can cost-effectively handle your data destruction requirements and remain compliant with relevant legislation.

Dig Deeper on Data backup security

  • What are the 3 methods of data sanitization?
    What are some tips for storage of sensitive data?

    What are the 3 methods of data sanitization?

    By: Paul Kirvan

  • What are the 3 methods of data sanitization?
    What to look for in a green cloud storage provider

    What are the 3 methods of data sanitization?

    By: Paul Kirvan

  • What are the 3 methods of data sanitization?
    Data retention and destruction policy template: A free download

    What are the 3 methods of data sanitization?

    By: Paul Kirvan

  • What are the 3 methods of data sanitization?
    7 steps to retiring storage hardware safely and efficiently

    What are the 3 methods of data sanitization?

    By: Robert Sheldon

What is the best data sanitization method?

Physical destruction is the best data sanitization method. It refers to the process of physically shredding hard drives, smartphones, laptops, printers, and other storage devices into tiny pieces using large mechanical shredders or degaussers.

What is a sanitization method?

A data sanitization method is a specific way in which a data destruction program or file shredder overwrites the data on a hard drive or other storage device.

Which can be considered form data sanitization?

Sanitizing data can be done by removing or replacing contextually-dangerous characters, such as by using a whitelist or escaping the input data. While it may not be intuitive, even data that a user submits to their own area on a site should be validated.

Why is data sanitization important?

Simply put, data sanitization renders data irretrievable by any means, even with advanced forensic tools. This can be particularly important for storage devices that contain sensitive information, such as medical devices and hard drives with sensitive or personal data.