5.2.2. Monitoring and Disposal
š” First Principle: Assets require monitoring throughout their operational life and secure disposal at end of life. Neglecting either creates risk ā unmonitored assets drift from security baselines, and improperly disposed assets leak sensitive data. The asset lifecycle doesn't end when a device is powered off.
Monitoring ā continuous tracking of asset status: patch levels, configuration compliance, utilization, and anomalous behavior. Agents, scanners, and network monitoring tools provide visibility. Key monitoring concerns include unauthorized software installations, end-of-life software still running in production, and assets approaching warranty expiration. Monitoring should also track asset location ā especially for mobile devices and laptops that travel outside the facility.
Asset disposal/decommissioning ā secure removal of assets from the environment. The goal is ensuring that no sensitive data can be recovered from disposed assets:
- Sanitization ā removing all data from storage media using methods appropriate to the data classification. Higher classifications require more thorough methods.
- Overwriting ā writing patterns over existing data (one or more passes). Sufficient for most purposes but may not destroy data in bad sectors or wear-leveled flash storage.
- Degaussing ā using powerful magnetic fields to erase magnetic media. Destroys the data and usually the media itself. Only works on magnetic storage ā completely ineffective on SSDs, flash drives, and optical media.
- Destruction ā physical destruction (shredding, incineration, pulverizing) is the most certain method. Required for the highest classification levels and when other methods aren't verifiable.
- Cryptographic erasure ā destroying the encryption keys for encrypted storage, rendering the data unrecoverable. Fast and effective for self-encrypting drives and encrypted storage volumes.
- Certification ā documenting that sanitization was performed according to standards, including the method used, date, and responsible individual. Creates an auditable trail for compliance.
ā ļø Exam Trap: Degaussing works on magnetic media only ā NOT on SSDs, flash drives, or optical media. If a question asks about securely disposing of an SSD, the answer is physical destruction or cryptographic erasure, not degaussing.
