8.2 Secure Erase
Western Digital PC SN730 NVMe SSD supports sanitization of user data using the
Format NVM command in one of the following modes:
1. The No Secure Erase mode implements logical erase of user data: cleanup of FTL
tables marks all blocks as unallocated. Subsequent read commands return zeroes
for erased data.
2. The User Data Erase mode implements physical erase of user data with NAND
block erase operation. The process covers all user LBAs including any spare and
re-allocated blocks.
3. The Crypto Erase implements cryptographic erase of user data by eradicating its
encryption key. The Crypto Erase mode is not supported on Non-SED devices.
Western Digital PC SN730 NVMe SSD SED supports sanitization of user data using the
Sanitize command in one of the following modes: Block Erase and Crypto Erase. The
Overwrite mode is not supported.
Sanitization of locked devices is supported on PC SN730 NVME SSD SED with PSID
revert command.
Table 8-1 summarizes sanitization modes and their result:
Table 8-1. Western Digital PC SN730 NVMe SSD Format NVM Modes and Results
8.3 Security of Read-Only Mode
Device enters Read-Only mode upon reaching End-of-Life conditions for user media.
In this mode, it stops accepting commands that might write user or system data.
Format NVM in the User Data Erase and the Crypto Erase mode is also supported
when device turns read only mode. It provides a secure option to erase all user data
before disposal of the device or before returning it for FA. Successful status returned
for the command is an indication of complete sanitization of user data. If device fails
to complete the process, sanitization should be addressed by physical destroy
methods, e.g. shredding.
Device preserves TCG locking settings as configured before transition to Read-Only
mode. Host application shall be ready that NVMe commands Format NVM and Sanitize
are aborted when device is Write-locked. Host shall unlock device with valid user
password before applying the command. Alternatively, it shall use sanitization
commands of the active TCG Opal protocol: TCG Revert.
PC SN730 NVMe SSD, Non-SED
Command Mode Operations Data at Rest Read Result
Format NVM 000b (No Secured Erase) FTL Cleanup Last Written Zeros
001b (User Data Erase) FTL Cleanup,
Block Erase
Erased Zeros
010b (Crypto Erase) N/A N/A N/A
ʱȭ ȴٸ...
װ ɰ
PSID ȣ SSD ƼĿ ֽϴ.
BIOS HDD Ŵ йȣ HDD/SSD Ʈѷ Ŵ°Ŷ κ ʱȭ ǹ ϴ.
մϴ (__)
Western Digital PC SN730 NVMe SSD supports sanitization of user data using the
Format NVM command in one of the following modes:
1. The No Secure Erase mode implements logical erase of user data: cleanup of FTL
tables marks all blocks as unallocated. Subsequent read commands return zeroes
for erased data.
2. The User Data Erase mode implements physical erase of user data with NAND
block erase operation. The process covers all user LBAs including any spare and
re-allocated blocks.
3. The Crypto Erase implements cryptographic erase of user data by eradicating its
encryption key. The Crypto Erase mode is not supported on Non-SED devices.
Western Digital PC SN730 NVMe SSD SED supports sanitization of user data using the
Sanitize command in one of the following modes: Block Erase and Crypto Erase. The
Overwrite mode is not supported.
Sanitization of locked devices is supported on PC SN730 NVME SSD SED with PSID
revert command.
Table 8-1 summarizes sanitization modes and their result:
Table 8-1. Western Digital PC SN730 NVMe SSD Format NVM Modes and Results
8.3 Security of Read-Only Mode
Device enters Read-Only mode upon reaching End-of-Life conditions for user media.
In this mode, it stops accepting commands that might write user or system data.
Format NVM in the User Data Erase and the Crypto Erase mode is also supported
when device turns read only mode. It provides a secure option to erase all user data
before disposal of the device or before returning it for FA. Successful status returned
for the command is an indication of complete sanitization of user data. If device fails
to complete the process, sanitization should be addressed by physical destroy
methods, e.g. shredding.
Device preserves TCG locking settings as configured before transition to Read-Only
mode. Host application shall be ready that NVMe commands Format NVM and Sanitize
are aborted when device is Write-locked. Host shall unlock device with valid user
password before applying the command. Alternatively, it shall use sanitization
commands of the active TCG Opal protocol: TCG Revert.
PC SN730 NVMe SSD, Non-SED
Command Mode Operations Data at Rest Read Result
Format NVM 000b (No Secured Erase) FTL Cleanup Last Written Zeros
001b (User Data Erase) FTL Cleanup,
Block Erase
Erased Zeros
010b (Crypto Erase) N/A N/A N/A