On Tue, 21 Feb 2012 15:52:57 -0600, Judy Schultz <[email protected]> wrote:
>We have a shark (2105-F20) that we need to erase the data on the volumes.
> IBM hardware support told me to use the UNCONFIGURE command on the ESS
> Specialist. Has anyone used this before and does it clean all of the data by 
> reinitializing
> it to zeroes?

For non-encrypting drives (2105 or 2107), perform a TRKFMT ERASEDATA CYCLES(n), 
where 'n' is set by your own data security people.  Each cycle will write 3 
different bit patterns.  Then delete the array.  When you delete the array, 
each drive will be formatted to zeros.  You cannot re-use the drive (DDM) in a 
new array until the low-level format is complete.

On the DS8000-series with the Full Disk Encryption feature, then TRKFMT 
ERASEDATA is not needed.  When you deconfigure an encrypted array, the drives 
will do the local equivalent of TRKFMT ERASEDATA before applying a final coat 
of zeros.

And just so no one gets too paranoid :-),  a track is tied to a physical 
location in the array.  When you write on a track, you are writing over 
whatever was there before.

As discussed earlier this week over on the IBMVM mailing list, this kind of 
erasure is (obviously?) necessary only when the drives are leaving your 
physically secure facility.  Hosts accessing the drives cannot see residual 
data after a simple host format operation (e.g. ICKDSF INIT or CPFORMAT, or CMS 
FORMAT).   Any residual data that is physically present is inaccessible.

Alan Altmark
Senior Managing z/VM and Linux Consultant
IBM Lab Services

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to