Skip to content
Control Stack logo Control Stack
ISM-1727 ASD Information Security Manual (ISM)

Methods for Destroying Semiconductor Memory

Specialised equipment like a furnace or hammer mill is used to destroy semiconductor memory to ensure security.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

Feb 2022

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
Semiconductor memory is destroyed using a furnace/incinerator, hammer mill or disintegrator.

Source: ASD Information Security Manual (ISM)

Plain language

This control is about making sure that when you don’t need your computer memory chips anymore, they’re completely destroyed. If you don’t do this properly, confidential data could be recovered by someone else later, posing a risk to your privacy and security.

Why it matters

Failure to physically destroy semiconductor memory can allow data recovery from chips, leading to leakage of sensitive information and compromise.

Operational notes

Regularly verify furnaces/incinerators, hammer mills or disintegrators meet required destruction outcomes, and record device IDs and destruction logs for audit.

Implementation tips

  • IT team members should gather old or broken semiconductor memory from computers or devices that are no longer in use. Collect them in a secure location to prevent loss or theft before destruction.
  • The IT manager should choose an appropriate method for destruction based on available resources. This might involve finding a local company with a furnace that can securely incinerate the memory chips.
  • Procurement should ensure any third-party service providers used for destruction are reputable and follow security protocols, such as having necessary certifications. Check references and industry standards before making a decision.
  • Facilities management should coordinate the physical transportation of semiconductor memory to the destruction site. Ensure the transport is secure by using a sealed and tracked container.
  • Once the memory is destroyed, IT or an authorised third party should document the process with photos or a certificate. This documentation should include date and method of destruction for records.

Audit / evidence tips

  • Ask: transportation records of semiconductor memory: Request documents or logs showing how the memory was transported to the destruction site

    Good: includes secure transport logs with dates and responsible parties clearly listed

  • Ask: contracts with destruction service providers: Request to see the contracts that outline agreements with external companies that destroy memory for you

    Good: shows a signed agreement that mentions adherence to current security standards

  • Ask: certificates or reports showing the destruction of memory

    Good: includes certificates that are specific and signed by the service provider

  • Ask: to see the procedure for memory destruction: Request the documented policy or procedure your organisation uses for this process

    Good: provides a detailed, step-by-step procedure with defined roles

  • Ask: incident reports related to memory disposal: Request any records of security incidents connected to memory disposal issues

    Good: shows a low number of incidents with swift, documented responses

Cross-framework mappings

How ISM-1727 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (2)
Annex A 7.10 ISM-1727 addresses secure end-of-life handling by mandating specific physical destruction methods for semiconductor memory
Annex A 7.14 ISM-1727 requires semiconductor memory to be physically destroyed using specialised destruction methods (e.g., furnace/incinerator, hamme...

Mapping detail

Mapping

Direction

Controls