You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox/data-box-security.md
+14-4Lines changed: 14 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,17 +133,26 @@ For more information, review the Microsoft Privacy policy at [Trust Center](http
133
133
134
134
The following security guidelines are implemented in Data Box:
135
135
136
+
:::zone pivot="dbx"
136
137
|Guideline |Description |
137
138
|---------|---------|
138
139
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
139
140
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| For adverse transport conditions endurance |
140
141
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf)| For secure firmware update |
141
142
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
142
-
:::zone pivot="dbx"
143
143
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
144
+
144
145
:::zone-end
146
+
145
147
:::zone pivot="dbx-ng"
148
+
|Guideline |Description |
149
+
|---------|---------|
150
+
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
151
+
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| For adverse transport conditions endurance |
152
+
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf)| For secure firmware update |
153
+
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
146
154
|Appendix A, Table A-8 for ATA Solid State Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
155
+
147
156
:::zone-end
148
157
149
158
@@ -152,9 +161,10 @@ The following security guidelines are implemented in Data Box:
152
161
The secure erasure process performed on our devices is compliant with [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) and following are the details of the implementation:
153
162
154
163
|Device |Data Erasure type |Tool used |Validation step |
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
157
-
|Azure Data Box 120 <br> Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
166
+
|Azure Data Box 120 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
167
+
|Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
158
168
|Azure Data Box Disk | In Public and Gov cloud: Block Erase |MSECLI tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
0 commit comments