Reparability Class | Reparability Index (R) |
A (most raparble) | R ≥ 4,00 |
B | 4,00 > R ≥ 3,35 |
C | 3,35 > R ≥ 2,55 |
D | 2,55 > R ≥ 1,75 |
E (least reparable) | 1,75 > R ≥ 1,00 |
Reference | Topic |
EN 45550:2020 | Definitions related to material efficiency (technical report) |
EN 45552:2020 | General method for the assessment of the durability of energy-related products |
EN 45553:2020 | General method for the assessment of the ability to remanufacture energy-related products |
EN 45554:2020 | General methods for the assessment of the ability to repair, reuse and upgrade energy-related products |
EN 45555:2019 | General methods for assessing the recyclability and recoverability of energy-related products |
EN 45556:2019 | General method for assessing the proportion of reused components in energy-related products |
EN 45557:2020 | General method for assessing the proportion of recycled material content in energy-related products |
EN 45558:2019 | General method to declare the use of critical raw materials in energy-related products |
EN 45559:2019 | Methods for providing information relating to material efficiency aspects of energy-related product |
Reference | Title | Direct applicability | Product or product group specific standards necessary |
En 45552 | General method for the assessment of the durability | X | |
EN 45553 | General method for the assessment of the ability to remanufacture | X | |
En 45554 | General method for the assessment of the ability to repair, reuse, upgrade | X | |
En 45555 | General methods for assessing the recyclability and recoverability | X | |
En 45556 | General method for assessing the proportion of reused components | X | |
En 45557 | General method for assessing the proportion of recycled content | X | |
En 45558 | General method to declare the use of critical raw materials | X | |
En 45559 | Method for providing information relating to material efficiency aspects | X |
Standard Name | # of Passes | Description |
Air Force System Security Instruction 5020 | 2 | Originally defined by the United States Air Force, this 2-pass overwrite is completed by verifying the write. |
Aperiodic random overwrite/Random | 1 | This process overwrites data with a random, instead of static, pattern. Each sector of the drive will contain different data. This process is completed by verifying the write. |
Blancco SSD Erasure | Proprietary | Blancco’s multi-phase, proprietary SSD erasure approach utilizes all supported SSD security protocols. This innovative method includes multiple random overwrites, firmware level erasure, freeze lock removal and full verification. |
Bruce Schneier’s Algorithm | 7 | This 7-step process, presented by security technologist Bruce Schneier, overwrites using 1s, 0s and a stream of random characters. |
BSI-2011-VS | 4 | This 4-pass system is the original BSI standard defined by the German Federal Office of Information Security. |
BSI-GS | 1 | Defined by the German Federal Office for Information Security, this process begins by removing hidden drives (HPA/ DCO if existing) and overwriting with aperiodic random data. The next step triggers a firmware-based command dependent on the type of drive. The last step is to verify the write. |
BSI-GSE | 2 | The BSI-GSE adds one extra step to the BSI-GS. After the first overwrite, an additional overwrite with aperiodic random data is added before moving on to the last two steps. |
CESG CPA – Higher Level | 3 | The UK government’s National Technical Authority for Information Assurance standard is a 3-pass process with a verification after each step. |
Cryptographic Erasure (Crypto Erase) | N/A | This method uses the native command to call a cryptographic erasure, which erases the encryption key. While the encrypted data remains on the storage device itself, it is effectively impossible to decrypt, rendering the data unrecoverable. Because this method uses the native commands as defined by the manufacturer, it is only available if supported by the drive being erased. |
DoD 5220.22-M | 3 | Published by the U.S. Department of Défense (DoD) in the National Industrial Security Program Operating Manual (also known as DoD document #5220.22-M), it specified a process of overwriting hard disk drives (HDDs) with patterns of ones and zeros. The process required three secure overwriting passes and verification at the end of the final pass. More on this standard is available at our blog, “Everything You Need to Know About the DoD 5220.22-M Disk Wiping Standard & Its Applications Today“. |
DoD 5220.22-M ECE | 7 | This method is an extended (7-pass) version of the DoD 5220.22-M. It runs the DoD 5220.22-M twice, with an extra pass (DoD 5220.22-M (C) Standard) sandwiched in between. |
Extended Firmware Based Erasure | 3 | This Blancco-defined standard adds an overwrite as the first step and then follows the standard Firmware Based Erasure, making this a 3-step process. |
Firmware Based Erasure | 2 | This Blancco-defined standard is a 2-step process triggers a firmware command that is dependent on the drive type. The last step of the process is to verify the write. |
HMG Infosec Standard 5, Higher Standard | 3 | Used by the British Government, this 3-pass overwrite adds one additional write. Like the baseline standard, this process is completed by verifying the write. |
HMG Infosec Standard 5, Lower Standard | 1 | Used by the British Government, this 1-pass overwrite consists of writing a zero pattern. This process is completed by verifying the write. |
IEEE 2883-2022 Clear | 0-2 | Developed by the IEEE Standards Association, IEEE Clear requires the removal/erasure of certain areas (such as hidden areas, depopulated storage elements, or cache zones, if existing). The data is then sanitized (via a firmware-based command or overwritten) and verified. To learn more, see our article, “New IEEE Data Erasure Standard Fills Technology Gap“ |
IEEE 2883-2022 Purge | 0-2 | Developed by the IEEE Standards Association, IEEE Purge requires the removal/erasure of certain areas (such as hidden areas, depopulated storage elements, or cache zones, if existing). The data is then sanitized (via a firmware-based command) and verified. To learn more, see our article, “New IEEE Data Erasure Standard Fills Technology Gap“ |
National Computer Security Center (NCSC-TG-025) | 3 | Defined by the US National Security Agency, this 3-pass system includes a verification after each pass of 0s, 1s and a random character. |
Navy Staff Office Publication (NAVSO P-5239-26) | 3 | Published by the US Navy, this 3-pass system uses a specified character (and its complement) and a random character. The process is completed by verifying the write. |
NIST 800-88 Clear | 0-2 | The National Institute of Standards and Technology Clear requires the removal of hidden areas (HPA/DCO, if existing). The data is then overwritten and verified. |
NIST 800-88 Purge | 0-2 | This method requires the removal of hidden areas (HPA/DCO, if existing). A firmware-based command is triggered depending on the type of drive, and the last step is the verify the write. Our NIST Guide gives more detail. |