PRODUCT CLAIMS TEST
The ADISA Product Claims Test service provides independent validation of a manufacturers claims made about the effectiveness of their product to sanitise data on various forms of storage media.
CERTIFIED PRODUCT CLAIMS TEST ORGANISATIONS
These vendors have products which are currently validated by our rigorous testing regime.
SEARCH BY MEDIA
Find an ADISA certified product by media type.
ADISA THREAT MATRIX
The threat matrix defines a series of capabilities and risks that various threat agents can pose on the security of a device.
Test Level | Threat Actor and Compromise Methods | Attack Examples |
---|---|---|
1 | Casual or opportunistic threat actor only able to mount unsophisticated attacks. | Keyboard attacks using the standard device interface using commercial off the shelf (COTS) or open-source forensic tools. |
2 | Motivated, targeted threat actor such as organised crime or journalists or hackers applying laboratory methods. | Advanced attacks using specialist hardware and software to interrogate the device / storage media using the device interface and component attacks. |
3 | State-sponsored organisations using sophisticated techniques with unlimited time and resources. | Typical attack may involve proprietary hardware and software techniques not available on the general commercial market. |