Get premium privacy for less: 2 years + 4 months at a special price.

Get 2 years + 4 months at a special price. Claim now!

Claim Now!

Expressvpn Glossary

Secure erase

Secure erase

What is a secure erase?

Secure erase is a process that permanently removes data from a storage device by overwriting or resetting the underlying storage so that erased data can’t be recovered with standard recovery tools.

Deleting a file or formatting a drive only removes the file references. The actual data often remains on the device. Secure erase is different because it targets the stored data itself, not just its references.

How does secure erase work?

Secure erase methods vary depending on the type of storage device.Flow diagram showing how secure erase works, from first identifying the data blocks, to overwriting the data or erasing the encryption keys to render the data unrecoverable.

Hard disk drives (HDDs)

Data is stored magnetically across the disk sectors. Secure erase overwrites all sectors with new data, often with zeros or random data. The process permanently destroys data by replacing it and can be done several times to ensure the previously stored information can’t be recovered.

Solid-state drives (SSDs)

Data is stored in flash memory cells managed by the drive’s controller. Secure erase uses firmware-level commands to reset these cells across the whole device, including areas the operating system can’t directly access.

Many SSDs support standardized device commands, such as the Advanced Technology Attachment (ATA) Secure Erase command defined by the T13 Committee. Some devices use cryptographic erase, which deletes the internal encryption key, so the existing data becomes unreadable.

Why is secure erase important?

Secure erase reduces the risk of data being recovered after a device is reused, returned, resold, or disposed of. It protects personal, financial, and business information and supports compliance with data protection regulations.

Secure erase also aligns with recognized data sanitization standards, including those from the National Institute of Standards and Technology (NIST), particularly SP 800-88, and the Department of Defense (DoD) 5220.22-M standard. This guidance defines different methods for clearing, purging, or destroying storage media and explains when each method is appropriate.

In regulated environments, organizations may need to document and verify that they used approved sanitization methods.

Where is it used?

Secure erase is used when storage devices leave a controlled environment or are reassigned. Common scenarios include:

  • Decommissioning servers, laptops, and desktop computers.
  • Returning leased equipment.
  • Selling or donating used devices.
  • Reassigning drives within an organization.
  • IT asset disposal and recycling systems.

It’s also used after security incidents when affected devices must be cleared before being reused.

Risks and privacy concerns of secure erase

The effectiveness of secure erase depends on the device and how it is implemented.

On some SSD devices, wear-leveling (designed to extend device lifespan by evenly distributing write/erase cycles across all memory blocks) can prevent some areas from being fully overwritten. Proper firmware-based erase commands are designed to address these areas, but reliability varies by manufacturer.

Tools labeled as “secure wipe” don’t always remove all underlying data. Verification usually involves confirming that the command completed successfully and that the device reports no accessible data.

Secure erase only applies to the device being wiped. Copies of data may still exist in backups, caches, synced systems, cloud storage, or hardware caches.

Secure erase is generally not suitable for highly sensitive data, severely damaged drives where erase commands might not reliably work, or where regulatory requirements demand high levels of assurance. In these cases, degaussing (demagnetizing HDDs) and shredding are often used.

Secure erase vs. other methods

Method How it works Device reusable? Notes
Formatting or deleting Removes only the file references Yes Underlying data often recoverable
Software overwrite tools Overwrites data via the operating system (OS) Yes Cannot reach areas inaccessible to the OS
Secure erase Uses device-level commands to overwrite or reset storage Yes More thorough than OS-level tools
Cryptographic erase Deletes encryption keys, rendering data unreadable Yes Effective only on encrypted devices
Physical destruction Renders the device inoperable No Guarantees data is unreadable; required for some regulatory context

Further reading

FAQ

Is secure erase the same as formatting?

No. Formatting removes file references but leaves underlying data intact and often recoverable. Secure erase overwrites or resets the storage itself.

Does secure erase work on SSDs?

Yes. Solid-state drives (SSDs) use built-in firmware commands to reset memory cells across the device. This approach is more effective than software-based overwriting for flash storage.

Can data be recovered after a secure erase?

Data is generally not recoverable after a properly executed secure erase. However, there may be some risk if the process was incomplete, the device has hardware faults, or copies of the data exist elsewhere, such as in backups or cloud storage.

How long does secure erase take?

The time depends on the device type, capacity, and implementation. It can range from a few minutes to several hours.

How is a secure erase verified?

Verification involves confirming that the device reports no accessible data after the process. Some tools also provide confirmation logs or status reports.
Get Started