PRODUCT CLAIMS TEST
The ADISA Product Claims Test service provides independent validation of a manufacturers claims made about the effectiveness of their product to sanitise data on various forms of storage media.
CERTIFIED PRODUCT CLAIMS TEST ORGANISATIONS
These vendors have products which are currently validated by our rigorous testing regime.
SEARCH BY MEDIA
Find an ADISA certified product by media type.
ADISA THREAT MATRIX
The threat matrix defines a series of capabilities and risks that various threat agents can pose on the security of a device.
|Test Level||Threat Actor||Type of Attack and compromise method||Sanitisation Method|
|1||Casual or opportunistic threat actor only able to mount high-level non-invasive and non-destructive software attacks utilizing freeware, COTS and OS tools,||Keyboard attacks from a motivated individual or professional organisation.|
Typical attack could be using open-source forensic tools or commercial tools
|Aligned to Clear
|2||Commercial data recovery and computer forensics organisation able to mount invasive/destructive software and hardware attack, utilising both COTS and bespoke hardware and software.||Laboratory attacks from commercial data recovery experts or specialist forensic scientists.|
Typical attack may be the use of advanced data recovery software, Chip Readers and protocol decoders.
Typical attack would involve analysis of individual hardware components as well as protocol structures.
|Aligned to Purge
|3||Government-sponsored organisations using advanced techniques to mount all types of software and hardware attacks with unlimited time and resources to recover sanitised data.||An attack agent of unknown capability and unlimited resource.|
Typical attacks would involve taking theoretical data recovery techniques and making them an actual capability.
|Aligned to Destroy