Skip to content
arrow_back
search
ISM-1067 policy ASD Information Security Manual (ISM)

Secure Erase for Non-Volatile Magnetic Media

Use secure erase plus software to fully overwrite data on hard drives, including hidden areas.

record_voice_over

Plain language

When you get rid of old hard drives or computers, you want to make sure no one can dig up any old files from them. This control tells us how to securely erase all the information stored on magnetic hard drives, even in the hidden parts. It's important because if data isn't erased properly, someone could access sensitive business or personal information without your knowledge.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P, S, TS

ISM last updated

Nov 2021

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

The ATA secure erase command is used, in addition to block overwriting software, to ensure the growth defects table of non-volatile magnetic hard drives is overwritten.
policy ASD Information Security Manual (ISM) ISM-1067
priority_high

Why it matters

Failure to use ATA Secure Erase plus block overwriting can leave data in growth defect tables, enabling data recovery.

settings

Operational notes

For HDD disposal, run ATA Secure Erase and then block-overwrite; record logs to confirm growth defect tables are overwritten.

Mapping detail

Mapping

Direction

Controls