Is Your Classified Data Secure? The NSA's MUST-FOLLOW Rules for Data Destruction You Can't Ignore!

Don't be scared, just make a plan!

Data Destruction Requirements under the National Security Agency's Policy Manual 9-12

In today's world, data is a valuable asset, and its security is of utmost importance, particularly when it involves sensitive national security information. The National Security Agency (NSA) plays a critical role in protecting our nation’s data, and its guidelines on data destruction are integral to ensuring that national security classified information is kept secure and out of unauthorized hands.

One of the primary ways the United States Federal Government uses to enforce data destruction standards for classified data is the NSA Policy Manual 9-12, which outlines strict procedures for destroying of classified and sensitive IT hardware such as hard disk drives. These guidelines are designed to prevent access of classified data even by exotic laboratory style attacks by nation state actors such as the Russian GRU or Chinese MSS. Let’s take a closer look at the key data destruction requirements set forth in the NSA Policy Manual 9-12.

Understanding the Importance of Secure Data Destruction

The NSA's policy on data destruction is not just about cleaning up storage devices; it’s about protecting national security. Improper disposal of sensitive information can lead to devastating consequences, including the unauthorized release of classified data, which could jeopardize both national defense and intelligence efforts. Therefore, adhering to the NSA's data destruction standards is a crucial aspect of maintaining operational security (OPSEC), protecting classified data, and often meeting contractual obligations.

The guidelines in NSA Policy Manual 9-12 help ensure that all information, whether in electronic or physical form, is securely destroyed to prevent any possibility of recovery or exploitation by adversaries.

Key Data Destruction Requirements under NSA Policy Manual 9-12

1. Final Disposition of Media

The NSA mandates that any media containing classified or sensitive data must be completely and securely destroyed when it is no longer needed. This includes:

The policy requires that all media be sanitized to prevent data recovery, and this destruction process must be irreversible, ensuring that no traces of the data remain.

2. Approved Methods of Data Destruction

NSA Policy Manual 9-12 provides a set of approved methods for data destruction, which must be followed to guarantee that data is thoroughly and securely destroyed. These include:

Degaussing and Destruction: For magnetic based information systems media such as Hard Disk Drives, Tape Drives, Floppy Drives, and Jazz Drives; running the media under a powerful magnetic degausser will wipe out the data. The NSA then requires physical destruction post degaussing for an additional security measure. Hard drive destruction devices are evaluated to ensure they can deform the disk platters into "4 or more" pieces. Hard Drive Shredding equipment is also approved as a destruction device. Be sure to check the field strength of your degausser and document it before destruction operations. You need to ensure your degausser is working as intended to sanitize data. 

Disintegration: For flash based media or other forms of solid state media, organizations can disintegrate down to 2mm dust. This includes media such as solid state drives, printed circuit boards, usb drives, sd cards, and optical media such as DVDs. For Solid State Disintegration machines, pay close attention to equipment's "Acceptable Materials". Some destruction equipment will break trying to destroy difficult media such as enterprise solid state drives due to them having higher metal content (heat sinks) vs other types of solid state media. 

It is important to note that CLASSIFIED HARDWARE MUST BE DESTROYED ONLY BY NSA EVALUATED PRODUCTS. The NSA maintains "Evaluated Products lists" and tests destruction equipment manufacturer claims. 

Incineration: The final option is incineration at 670 degrees C. This is approved for all types of media but has significant drawbacks. First your organization must bring the classified IT hardware to the incineration facility. These classified material movements are quite expensive, labor intensive, and present their own safety and security concerns. Second, some private sector organizations are hesitant to sign contracts directly with incineration facilities due to long term legal liabilities under the EPA's Superfund laws. If the incineration facility goes bankrupt and the EPA declares the facility a Superfund clean up site, the EPA has the authority to go through the books of who used that facility. The EPA will then take these organizations to court to try and secure funds in order to pay for environmental clean-up. We cannot provide legal counsel if you have additional questions get with legal experts in this field. 

3. Documentation of Destruction

NSA Policy Manual 9-12 stresses the importance of maintaining detailed records of data destruction activities and directs organizations to review NSA PM 6-22's "Administrative Declassification" section on documentation requirements. This documentation serves several purposes:

The required documentation should include:

Proper documentation is essential for both internal record-keeping and demonstrating compliance during audits or inspections.

4. Destruction of Backup and Redundant Copies

In addition to the primary copies of classified or sensitive data, backup copies and redundant storage devices must also be destroyed. Often, sensitive data is backed up to ensure redundancy and continuity of operations. These backups, regardless of their format, must be destroyed using the same methods and standards as the original data to prevent any risk of information leakage.

5. Third-Party Contractors and Data Destruction

The NSA recognizes that organizations may use third-party contractors to perform data destruction. In such cases, the NSA requires that these contractors comply fully with the PM 9-12's standards. However the NSA DOES NOT EVALUATE DESTRUCTION CONTRACTORS. They only evaluate destruction equipment manufacturer's machines. Every organizations seeking to outsource their classified destruction to third-party vendors should explicitly outline the data destruction standards required.

Organizations must verify that any contractor they work with for classified destruction are fully compliant with NSA standards before entrusting them with data destruction responsibilities. If the contractor personnel are not cleared or read-on to the classified program, they need to be supervised by 2 cleared personnel until all classified media is sanitized.

6. Security of Data During Destruction

NSA Policy Manual 9-12 and 6-22 also mandates that appropriate security measures be taken while data is being destroyed. This includes ensuring that data is securely transported to destruction facilities, protecting data from unauthorized access during the process, and preventing leaks or breaches during the destruction phase.

We offer mobile destruction trucks and typically work with customers to set up a Temporary Secure Working Area (TSWA) to maintain control and accountability of classified materials. This usually involves guards, visual barriers, and customer support personnel. 

7. Destruction of Physical Records

In addition to digital media, the NSA’s policy extends to physical records, including paper documents, that contain classified or sensitive information. These documents must be shredded or otherwise destroyed using evaluated destruction equipment. Simply discarding or recycling documents is not enough. Proper handling and disposal of physical records are just as crucial as digital data destruction.

Why Compliance with NSA Policy Manual 9-12 is Crucial

Adherence to the NSA's data destruction requirements is critical for national security. Improper destruction of sensitive or classified data could expose the U.S. government, military, or intelligence agencies to risks such as espionage, data breaches, or adversarial exploitation. It’s not just about protecting physical or digital assets—it’s about safeguarding the very systems that ensure the security of our nation.

Organizations that handle classified information, whether governmental or contracted, must remain diligent in their efforts to meet these destruction standards. This is not just a matter of policy—it’s a matter of national security.

Best Practices for Ensuring Compliance with the NSA Policy Manual 9-12.

While NSA PM 9-12 offers clear guidelines for data destruction, successful implementation requires more than just following technical steps. Organizations should also:

Conclusion

The NSA Policy Manual 9-12 provides a comprehensive framework for the secure destruction of sensitive and classified data. By following NSA PM 9-12, organizations ensure that data is disposed of in a way that prevents unauthorized access, maintains compliance with national security standards, and upholds operational security. Whether it's through, degaussing, disintegration, or incineration, these processes help protect against data breaches and safeguard critical information from falling into the wrong hands. For organizations handling sensitive data, adhering to these destruction protocols is essential for protecting both national security and the integrity of their operations. If your organization needs assistance in following NSA PM 9-12 please reach out to us at contact@mansfieldtech.us


Written by Christopher McDevitt with assistance from AI.