Secure-Erasing Methods
Secure-Erasing Methods
Secure-Erasing Methods
BSI-GS: (1 Pass)
Defined by the German Federal Office for Information Security, this process begins by
removing hidden drives (HPA / DCO if existing) and overwriting with aperiodic random
data. The next step triggers a firmware-based command dependent on the type of drive.
The last step is to verify the write.
BSI-GSE: (2 Passes)
The BSI-GSE adds one extra step to the BSI-GS. After the first overwrite, an additional
overwrite with aperiodic random data is added before moving on to the last two steps.
Page 1|3
2020/09/16 – Wednesday
BSI-2011-VS: (4 Passes)
This 4-pass procedure is the original BSI standard defined by the German Federal Office
of Information Security.
Page 2|3
2020/09/16 – Wednesday
Online Sources:
1. Eraser Heidi: https://eraser.heidi.ie/appendix-a-erasure-methods/
2. Blancco: https://www.blancco.com/blog-comprehensive-list-data-wiping-erasure-
standards/
3. MCS: https://www.mcs.support/a-list-of-secure-data-wiping-and-erasure-
standards/
4. Lifewire: https://www.lifewire.com/gutmann-method-2625891
Page 3|3