
Security Features and Document of Volatility
Memory Clearing, Sanitization and Removal Procedures
11
5
Memory Clearing, Sanitization and Removal Procedures
This chapter describes several security functions you can use to remove
sensitive data stored in the instrument before moving it from a secure
development environment. The functions described are:
—
—
“Clear Persistent State Information” on page 12
—
“Clear Most Mode States and Persistent State Information” on page 12
—
“Multi-box Sync Setup” on page 13
—
—
—
“Removal or Replacement of Solid-State Disk Drive (SSD)” on page 14
CAUTION
These functions do
not
erase or sanitize external media connected to the
instrument’s USB ports.
Erase SSD
This function erases all user files, such as PDW files and user correction files,
from the instrument’s SSD, using the ATA command SECURITY ERASE UNIT,
with the "Erase Mode" parameter set to "Normal". (For more details of this
command, see
AT Attachment 8 - ATA/ATAPI Command Set (ATA8-ACS)
The instrument state settings are all set to defaults except for LAN settings.
Only user information is present on the SSD; no internal calibration or other
internal files are stored on the SSD.
Key Sequence:
System
>
File
>
More
>
Security
>
Erase SSD
>
Confirm Erase
SCPI Command:
:SYSTem:SECurity:ERASe