Master the DoD 5220.22-M algorithm — a proven, credible, and widely recognized secure wiping method used across industries for permanent data destruction from hard disk drives.
Media sanitization — commonly referred to as data sanitization — is crucial for organizations to prevent leakage of confidential and sensitive data from storage media including hard drives, USB flash storage, and servers. Failure to properly wipe data when releasing storage hardware from custody can expose company sensitive information and lead to devastating data breaches with millions in penalties.
Data destruction standards like DoD 5220.22-M by NISPOM outline specific processes for performing data wipes on hard drives, SSDs, and other storage media. These standards define the number of overwrite passes, overwriting patterns, and verification methods required to erase data beyond any possibility of recovery before devices are redeployed, recycled, resold, or discarded.
DoD 5220.22-M, also known as the National Industrial Security Program Operating Manual (NISPOM), is a media sanitization standard established by the U.S. Department of Defense. It outlines regulatory measures and normative practices for sanitizing information systems and storage media used to store classified information.
The standard recommends overwriting all addressable memory locations with a character, its complement, then a random character, followed by verification to clear and sanitize information on the storage media completely.
The Department of Defense 5220.22-M uses three overwrite passes (0s, 1s, Random) with a 100% verification pass. In 2001, the DoD 5220.22-M ECE method — a 7-pass version — was published, running the standard twice with an additional pass between. However, the three-pass method remains the standard implementation.
Writes a zero to all addressable locations and verifies the write was successful.
Writes a one to all addressable locations and verifies the write was successful.
Writes a random character to all locations and performs final verification.
Some variations use different characters, complements, and verification frequencies. For example, an altered version uses the number 97 instead of a random character for the final pass.
The DoD 5220.22-M specifies different 'clear' and 'sanitize' methods for various types of storage media. Understanding these recommendations helps organizations choose the appropriate approach for their specific hardware.
| Method | Description | Applicable Media |
|---|---|---|
| Destroy | Disintegrate, incinerate, pulverize, shred, or melt | All media types |
| Overwrite | Overwrite all addressable locations with pattern + complement + random, verify | Magnetic media |
| Full Chip Erase | Execute per manufacturer's datasheets | EEPROM, EAPROM |
The DoD 5220.22-M algorithm has long been recognized as a reliable and secure method for erasing data from traditional hard disk drives. Known for its credibility and widespread use across industries, it remains one of the most frequently referenced data-wiping standards due to its established legacy.
The three-pass overwrite process provides comprehensive, efficient wiping compared to other methods like the 35-pass Gutmann standard — particularly important when erasing large inventories of drives simultaneously.
The final verification pass adds critical assurance to the data erasure process, confirming that all storage locations have been properly overwritten.
DoD 5220.22-M is a legacy standard primarily designed for magnetic drives. Multiple overwrite passes are no longer recommended by NIST 800-88 or IEEE 2883:2022 for modern media.
The standard does not support wiping of flash memory-based storage such as solid-state drives (SSDs), hybrid drives, or other modern storage technologies. For these devices, standards such as NIST SP 800-88 and IEEE 2883:2022 are more suitable.
Since 2014, the NISPOM guideline has recommended NIST SP 800-88 media sanitization guidelines as the primary guidance document. The Department of Defense no longer references DoD 5220.22 as the sole method for secure HDD wiping.
There is no official "DoD Certificate of Destruction." However, DoD-compliant data wiping software can generate certificates of erasure serving as auditable proof of data destruction.
"DoD wipe" means overwriting all addressable locations on a hard drive as per steps specified in the DoD 5220.22-M algorithm. D-Secure Drive Eraser performs wiping of drives using the DoD 5220.22-M standard along with many other international standards.
For organizations handling sensitive or regulated information, data disposal isn't just a routine task — it's a critical step in protecting both the business and customers. DoD wiping provides a trusted and verified method for data erasure, meeting one of the most stringent data security standards worldwide.
Companies in sectors like healthcare, finance, and government rely on DoD-compliant wiping solutions to ensure retired or repurposed devices no longer contain recoverable data. This helps mitigate risks, protect brand reputation, and maintain regulatory compliance.
Your email address will not be published. Providing an email is optional.
Send us an enquiry regarding: Do D Wiping Standard
Access DoD 5220.22-M, NIST 800-88, and 20+ international standards in one powerful solution. Get tamper-proof certificates for complete compliance.
No comments yet. Be the first to comment.