Skip to content

Commit 604b2de

Browse files
authored
Merge pull request #302683 from LakshJ-MS/patch-23
Update data-box-security.md
2 parents 0d86912 + 2ad2d59 commit 604b2de

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed

articles/databox/data-box-security.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@ For more information, review the Microsoft Privacy policy at [Trust Center](http
133133

134134
The following security guidelines are implemented in Data Box:
135135

136+
:::zone pivot="dbx"
136137
|Guideline |Description |
137138
|---------|---------|
138139
|[IEC 60529 IP52](https://www.iec.ch/) | For water and dust protection |
@@ -141,6 +142,32 @@ The following security guidelines are implemented in Data Box:
141142
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf) | For data protection |
142143
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) | For data sanitization |
143144

145+
:::zone-end
146+
147+
:::zone pivot="dbx-ng"
148+
|Guideline |Description |
149+
|---------|---------|
150+
|[IEC 60529 IP52](https://www.iec.ch/) | For water and dust protection |
151+
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf) | For adverse transport conditions endurance |
152+
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf) | For secure firmware update |
153+
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf) | For data protection |
154+
|Appendix A, Table A-8 for ATA Solid State Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) | For data sanitization |
155+
156+
:::zone-end
157+
158+
159+
## Media Sanitization details
160+
161+
The secure erasure process performed on our devices is compliant with [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) and following are the details of the implementation:
162+
163+
|Device |Data Erasure type |Tool used |Validation step |
164+
|----------------|------------|-------------|---------|
165+
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
166+
|Azure Data Box 120 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
167+
|Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
168+
|Azure Data Box Disk | In Public and Gov cloud: Block Erase |MSECLI tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
169+
170+
144171
## Next steps
145172

146173
- Review the [Data Box requirements](data-box-system-requirements.md).

0 commit comments

Comments
 (0)