Data Ontap Disk Sanitization; Data Confidentiality; Background; Data Erasure And Standards Compliance - IBM N series Hardware Manual

System storage
Hide thumbs Also See for N series:
Table of Contents

Advertisement

13.1 Data ONTAP disk sanitization

IBM N series Data ONTAP includes Disk Sanitization with a separately licensable, no-cost
solution as a part of every offered system. When enabled, this feature logically deletes all
data on one or more physical disk drives. It does so in a manner that precludes recovery of
that data by any known recovery methods. The obliteration is accomplished by overwriting the
entire disk multiple times with user-defined patterns of data. The disk sanitization feature runs
a disk-format operation. This operation uses three successive byte overwrite patterns per
cycle and a default six cycles per operation for a total of 18 complete disk overwrite passes.
Disk sanitization can be performed on one or more physical disk drives. You can sanitize or
cleanse all disks that are associated with a complete Write Anywhere File Layout (WAFL)
volume (and spares). You can also perform subvolume cleansing, such as cleansing a qtree,
a directory, or a file. For subvolume cleansing, any data that you want to retain must be
migrated to another volume before the cleansing process is performed. This volume can be
on the same storage or another storage system. After the data migration is complete,
sanitization can be performed on all of the drives that are associated with the initial original
volume.

13.2 Data confidentiality

In every industry, IT managers face increasing pressure to ensure the confidentiality of
corporate, client, and patient data. In addition, companies and managers in certain industries
must comply with laws that specify strict standards for handling, distributing, and the use of
confidential client, corporate, and patient information.
There are methods and products to aid in data storage and transmission security as the data
moves through the system. However, assuring confidentiality of data on desktop or notebook
computers when they leave the premises for disposal presents a different set of challenges
and exposures. The following sections describe those challenges and demonstrate the value
of third-party disposal.

13.2.1 Background

Data confidentiality always is an issue of ethical concern. However, with the enactment of
laws to protect the privacy of individual health and financial records, it also became a legal
concern.
Most IT managers have a strategy in place for securing customer information within their
networks. This is especially true in the healthcare industry, where controlling data interchange
with vendors to ensure that patient privacy is a major concern.
The market offers various products and services to assist managers with these challenges.
Many offer ways to integrate confidentiality and compliance into daily operations.

13.2.2 Data erasure and standards compliance

To prevent the exposure of commercially sensitive or private customer information, ensure
that the storage devices are sanitized, purged, or destroyed before reuse or removal.
182
IBM System Storage N series Hardware Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents