Specifying File Deletion Options

The Regulatory Compliance Module (RCM) provides a data sanitization/data wiping option, which satisfies PCI DSS requirements. If you do not activate the module, this feature is disabled after the trial expires.

You can configure EFT to securely delete or purge a file by writing over the initial data using encrypted and/or pseudorandom data. A menu of purging methods is available; available options depend on the library used.

  • The 3-pass DoD method overwrites all addressable locations with a character and its complement, then a random character, and does this three times.

  • The pseudorandom data wiping method does the following:

    1. Initializes the wincrypt library

    2. Fills the file with randomly generated data from the wincrypt library

    3. Flushes the data to disk

    4. Deletes the file from file system calling the standard function DeleteFile()

*.pgp files are automatically excluded from the wipe process. When wipe is enabled, ANY delete operation also includes the wipe (sanitization) process.

To specify a delete method

  1. In the administration interface, connect to EFT and click the Server tab.

  2. On the Server tab, click the Site that you want to configure.

  3. In the right pane, click the Security tab.

  4. In the Data Security area, next to Secure data removal, click Configure. The Data Sanitation dialog box appears.

  5. In the Delete method box, click the list to specify one of the following methods:

    • Windows standard (fastest)

    • Pseudorandom data (medium)

    • 3-pass DoD 5220.22-m (slow)

  6. Click OK to close the dialog box.

  7. Click Apply to save the changes on EFT.

  8. A message appears when the purging mechanism is changed to anything other than the Windows standard delete method.

For further reference regarding data wiping, see the following articles:

(These links are outside of Globalscape's domain and could change.)