Sanitize

Introdution

 

Sanitize features provide standardized, secure, and verifiable methods to irreversibly erase all user data stored on SSDs, including areas that are not accessible through regular deletion or formatting. Sanitize commands are defined in both the NVMe and SATA specifications. For PCIe SSDs, they are specified in the NVMe standard; for SATA SSDs, they are defined in the ATA specification by the T13 Technical Committee.

 

Unlike ordinary file deletion or a quick format, Sanitize commands target all storage areas, including: User addressable space, Over-provisioned blocks, Spare and remapped blocks. Once the Sanitize operation is initiated, it will automatically resume and complete even if a power interruption occurs. This is a key distinction from other erase commands, ensuring the reliability of data destruction.

 

Sanitize Methods generally refer to three standardized techniques defined in the major specifications: 

 

Block Erase

 

Block Erase performs a low-level operation that resets each NAND flash memory block to an erased state. SSD issues erase commands to every physical block, setting all previously written data back to the “1” state (erased). This process covers both user data and internal reserved areas. SP Industrial Block Erase typically takes several minutes to tens of minutes, depending on drive capacity. This method is often used when a device is being decommissioned and no encryption is enabled, or when a full physical reset of all NAND cells is required.

 

ALL_fac_technology_25G30_AyXnv8Ef0j

Overwrite

 

Overwrite writes a specific data pattern to every accessible and inaccessible block. SSD first erases the blocks, then writes the defined pattern over all of them. This process is repeated in multiple passes to provide a higher level of assurance that no residual data remains. Overwrite is slower than Block Erase, as it requires both erase and write cycles.

 

ALL_fac_technology_25G30_6UI8fRLs1h

Cryptographic Erase

 

Cryptographic Erase (CE) invalidates data by destroying the encryption key used to protect all stored information. SSDs with hardware encryption (Self-Encrypting Drives, or SEDs) use AES-256 to transparently encrypt all data. When Cryptographic Erase is triggered, the drive either deletes or regenerates the encryption key, rendering all previously encrypted data permanently unreadable. Cryptographic Erase executes extremely quickly. Industrial SSDs can use multi-channel erase techniques to sanitize a 1TB pSLC SSD in around 10 seconds. —and does not require any physical overwriting or erasure of NAND blocks. 

 

ALL_fac_technology_25G30_rAhmJHIv7A

 

 

 

COMPARE
0
/
4
Select your language
PLEASE SELECT YOUR LANGUAGE

If deny all, it may lose some essential functionalities.

To view more privacy policies, please click here.

Privacy preferences

If deny all, it may lose some essential functionalities.

To view more privacy policies, please click here.

Privacy Policy

Manage preferences

Necessary cookie

Always on

網站運行離不開這些 Cookie 且您不能在系統中將其關閉。通常僅根據您所做出的操作(即服務請求)來設置這些 Cookie,如設置隱私偏好、登錄或填充表格。您可以將您的瀏覽器設置為阻止或向您提示這些 Cookie,但可能會導致某些網站功能無法工作。