Get a Pentest and security assessment of your IT network.

Cyber Security

Secure Key Storage: Quick-Erase USB Drives

TL;DR

Yes, small capacity USB drives with quick-erase functionality are available and can be useful for storing sensitive information. However, ‘quick erase’ isn’t always enough. We’ll cover drive types, secure deletion methods, and important considerations to keep your data safe.

1. Understanding the Need

Storing keys (passwords, encryption keys, etc.) on physical media carries risk. If lost or stolen, the information is compromised. Quick-erase devices aim to mitigate this by allowing fast deletion of data, but standard formatting isn’t secure.

2. Drive Types & Features

  1. USB 3.0/3.1 Drives: These are common and affordable. Look for drives specifically advertising ‘secure erase’ or ‘data destruction’ features.
  2. Self-Encrypting Drives (SEDs): More expensive, but offer hardware encryption. Secure deletion involves changing the encryption key, rendering data unreadable.
  3. OTP (One-Time Programmable) Memory: These are rare for general use but provide a very high level of security as they can only be written to once.

Capacity wise, 8GB – 32GB is often sufficient for key storage and keeps the drive discreet.

3. Secure Deletion Methods

Don’t rely solely on a ‘quick erase’ button. Here’s how to properly wipe data:

  1. Software-Based Wiping: Use dedicated secure deletion tools. These overwrite the drive multiple times with random data.
  2. SED Secure Erase: If you have a SED, use the manufacturer’s utility to perform a cryptographic erase.
    • This usually involves entering an admin password and initiating the secure erase process through software provided by the drive maker.

4. Step-by-Step Secure Wipe (using Eraser as an example)

  1. Download & Install: Download Eraser from https://eraser.heidi.ie/ and install it on your computer.
  2. Select Drive: Launch Eraser and select the USB drive you want to wipe. Be absolutely sure you’ve chosen the correct drive!
  3. Choose Method: Select a secure erase method. ‘Gutmann’ is very thorough but slow. ‘DoD 7-pass’ is a good balance of security and speed.
    # Example Eraser settings (screenshot would be better here)
  4. Start Wipe: Click ‘Erase’. The process will take some time depending on the drive size and method chosen.
  5. Verify: After completion, attempt to recover data from the drive using a file recovery tool (e.g., Recuva) to confirm it’s been wiped.

5. Important Considerations

  • Physical Security: A quick-erase device is useless if physically stolen while unlocked. Protect the drive with strong physical security measures (safe, locked drawer).
  • Encryption: Always encrypt the data *before* storing it on the drive, even with a secure erase function. Use tools like VeraCrypt or BitLocker.
  • Firmware Vulnerabilities: Some drives have firmware vulnerabilities that could allow data recovery even after wiping. Keep your drive’s firmware updated if possible (check manufacturer’s website).
  • Wear Levelling: SSD-based USB drives use wear levelling, which can make complete data erasure difficult. SEDs are preferable for SSDs.

6. Alternatives

Consider these if physical media isn’t essential:

  • Password Managers: Store keys securely in encrypted password managers (e.g., LastPass, 1Password).
  • Hardware Security Modules (HSMs): Dedicated devices for key storage and cryptographic operations – more expensive but highly secure.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation