You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/databox/data-box-security.md
+27Lines changed: 27 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,6 +133,7 @@ For more information, review the Microsoft Privacy policy at [Trust Center](http
133
133
134
134
The following security guidelines are implemented in Data Box:
135
135
136
+
:::zone pivot="dbx"
136
137
|Guideline |Description |
137
138
|---------|---------|
138
139
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
@@ -141,6 +142,32 @@ The following security guidelines are implemented in Data Box:
141
142
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
142
143
|Appendix A, for ATA Hard Disk Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
143
144
145
+
:::zone-end
146
+
147
+
:::zone pivot="dbx-ng"
148
+
|Guideline |Description |
149
+
|---------|---------|
150
+
|[IEC 60529 IP52](https://www.iec.ch/)| For water and dust protection |
151
+
|[ISTA 2A](https://ista.org/docs/2Aoverview.pdf)| For adverse transport conditions endurance |
152
+
|[NIST SP 800-147](https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-147.pdf)| For secure firmware update |
153
+
|[FIPS 140-2 Level 2](https://csrc.nist.gov/csrc/media/publications/fips/140/2/final/documents/fips1402.pdf)| For data protection |
154
+
|Appendix A, Table A-8 for ATA Solid State Drives in [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf)| For data sanitization |
155
+
156
+
:::zone-end
157
+
158
+
159
+
## Media Sanitization details
160
+
161
+
The secure erasure process performed on our devices is compliant with [NIST SP 800-88r1](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf) and following are the details of the implementation:
162
+
163
+
|Device |Data Erasure type |Tool used |Validation step |
|Azure Data Box | In Public cloud: Crypto Erase <br> In Gov cloud: Crypto Erase + Disk overwrite |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
166
+
|Azure Data Box 120 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
167
+
|Azure Data Box 525 | In Public and Gov cloud: Block Erase |ARCCONF tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
168
+
|Azure Data Box Disk | In Public and Gov cloud: Block Erase |MSECLI tool | Random 10% sampling + Secondary 2% Sampling using In-house tool |
169
+
170
+
144
171
## Next steps
145
172
146
173
- Review the [Data Box requirements](data-box-system-requirements.md).
0 commit comments