Secure disposal or re-use of equipment

ISO/IEC 27017 Clause 11.2.7 requires you to verify that any equipment containing storage media has had sensitive data and licensed software removed or securely overwritten before disposal or re-use, including cloud infrastructure equipment. Operationalize this by standardizing decommission workflows, using approved sanitization methods, and retaining auditable records proving each asset was sanitized and verified.

Key takeaways:

  • You must verify sanitization, not just perform it, before equipment is disposed of or re-used.
  • Scope includes cloud infrastructure equipment and any storage-bearing components (drives, arrays, appliances, removable media).
  • Your audit pass/fail hinges on repeatable process + per-asset evidence (chain of custody, wipe logs, approvals, and exception handling).

Secure disposal or re-use of equipment is a deceptively simple requirement that frequently fails in practice because it sits between teams: IT asset management, data center ops, cloud ops, security, and third parties that handle transport, repair, resale, or destruction. ISO/IEC 27017:2015 Clause 11.2.7 makes the operator expectation explicit: before a device leaves your control or changes hands internally, you need proof that sensitive data and licensed software are gone or irrecoverably overwritten, and that someone verified that outcome. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

For a Cloud Service Provider (CSP), the risk is amplified because storage is multi-tenant, hardware lifecycles are fast, and infrastructure components can be repurposed across environments. A single miss can become a customer data exposure event, a licensing dispute, or an audit qualification. This page translates the clause into an implementable control with clear roles, step-by-step operating procedures, and the evidence package auditors typically ask for. It also highlights where “we wiped it” is not enough, and how to design a process that survives asset exceptions like failed drives, RMAs, and third-party repairs.

Regulatory text

Requirement (verbatim): “All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use, including cloud infrastructure equipment.” (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Plain-English interpretation

  • If it can store data, treat it as in scope. That includes servers, laptops, virtualized hosts with local disks, storage arrays, removable drives, backup media, and embedded storage in network/security appliances.
  • Before disposal or re-use, you must remove/overwrite data and licensed software. Disposal includes recycling, resale, return-to-lessor, and destruction. Re-use includes redeploying within your environment, moving between tenants, labs, and lower environments.
  • Verification is mandatory. You need an explicit check that sanitization happened and succeeded, performed by an accountable role, with records tied to an asset identifier.

Who it applies to

In-scope entities

  • Cloud Service Providers operating infrastructure that stores or processes customer data, including IaaS/PaaS providers and SaaS providers that manage their own underlying infrastructure. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

In-scope operational contexts

  • Data center decommissioning: retiring racks, arrays, or individual drives.
  • Repair and RMA workflows: failed disks, warranty returns, vendor repair depots.
  • Asset refresh cycles: end-of-life server replacements, storage expansions.
  • Internal redeployments: moving hardware between clusters, tenants, or environments.
  • Third-party handling: transport, disposal, recycling, destruction, refurbish/resale, or temporary custody.

What you actually need to do (step-by-step)

1) Define scope and ownership (process design)

  1. Create an equipment sanitization standard covering disposal and re-use, explicitly including cloud infrastructure equipment and any storage media.
  2. Assign roles:
    • Asset owner (ITAM or Infrastructure)
    • Sanitization operator (Data center ops / Endpoint ops)
    • Verifier/approver (Security or a delegated independent approver)
    • Exception authority (Security + Legal/Procurement for third-party edge cases)

Operator tip: auditors look for separation between “did the wipe” and “approved the wipe” on higher-risk assets, even if both are in the same team.

2) Build an asset state machine (so nothing “falls out”)

Define simple, enforceable states in your ticketing/ITAM system:

  • In Service → Pending Decommission → Sanitization In Progress → Sanitized (Verification Pending) → Verified Sanitized → Released (Disposed/Re-used)

Block release actions (shipping, surplus sale, redeploy) unless the record is in Verified Sanitized.

3) Standardize approved sanitization methods by media type

Create a decision matrix that operators can follow:

Media type / scenario Minimum action Verification evidence
Re-usable drives (healthy) Secure overwrite using an approved tool/method Tool log + asset ID match + verifier sign-off
Full-disk encryption already enabled Crypto-erase or key destruction (where supported) Proof of key destruction or crypto-erase report + verifier sign-off
Failed drives / cannot overwrite Physical destruction or controlled return under contract Destruction certificate or RMA chain-of-custody + exception approval
Appliances with embedded storage Factory reset plus secure wipe or crypto-erase Reset/wipe record + configuration validation + verifier sign-off

Keep the matrix short. Operators will ignore a long one.

4) Embed verification as a required control point

Verification means more than “checkbox complete.” Require the verifier to confirm:

  • Correct asset identifier (serial/asset tag) matches the wipe record.
  • Method used matches the standard for that media type.
  • Outcome indicates success (not partial, not failed).
  • Licensed software removal is addressed (see next step).
  • Exceptions are documented and approved.

5) Address licensed software removal (often missed)

This clause explicitly includes licensed software. Translate that into two operational checks:

  • License recovery: confirm the device is removed from license management portals (where applicable) or deactivated.
  • No prohibited transfer: if equipment is sold or transferred, confirm licensing terms allow it, or ensure the software is removed before transfer.

Practical approach: add a “licensed software cleared” field in the decommission ticket, with evidence attachment options (portal screenshot, deprovision log, or confirmation from software asset management).

6) Control third parties that touch equipment

If a third party transports, destroys, refurbishes, or repairs equipment:

  • Contractually require secure handling and sanitization/destruction aligned to your standard.
  • Require chain-of-custody (who had it, when, and where).
  • Require evidence (destruction certificate, sanitization report, or equivalent output).
  • Define how you handle failed drives and RMAs (do you keep drives, or do you allow return under strict terms).

Tie these requirements to third-party onboarding and renewal reviews. Daydream can help you track which third parties handle assets, collect their evidence packages, and map contract clauses to your control expectations without chasing email threads.

7) Handle exceptions without breaking the control

Common exceptions: failed disks, urgent swaps, leased gear return windows, remote sites. Create a formal exception path:

  • Risk acceptance request with asset list and reason.
  • Compensating control (e.g., physical destruction, escrowed return, supervised wipe).
  • Time-bounded approval and closure requirements.
  • Post-mortem on repeat exceptions (process fix, not repeated waivers).

Required evidence and artifacts to retain

Auditors typically want per-asset traceability plus process-level governance. Maintain:

  • Sanitization and disposal/re-use policy/standard referencing verification requirement. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)
  • Asset inventory records with unique identifiers, owner, location, and lifecycle status.
  • Decommission tickets/work orders showing approvals, dates, and disposition (disposed vs re-used).
  • Wipe/overwrite logs that include asset identifier and success status.
  • Verification sign-off (separate control point) tied to the wipe record.
  • Licensed software removal evidence (deprovision logs, license portal records, or SAM confirmation).
  • Chain-of-custody records for any movement outside secure areas.
  • Third-party certificates (destruction, recycling, sanitization), plus the third party’s scope of work.
  • Exception records with approvals and compensating controls.

Retention length should follow your internal policy; ISO/IEC 27017:2015 Clause 11.2.7 requires verification and does not specify a retention period. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Common exam/audit questions and hangups

  • “Show me the last set of decommissioned assets and the wipe evidence for each.”
  • “How do you prevent equipment from being shipped before sanitization is verified?”
  • “How do you treat failed drives that cannot be overwritten?”
  • “How do you ensure multi-tenant risk is addressed for cloud infrastructure re-use?”
  • “Where do you prove licensed software was removed, not only data?”
  • “Which third parties handle decommissioned equipment, and what evidence do you obtain?”

Hangups that trigger findings:

  • Logs exist, but can’t be matched to a serial number.
  • Process exists, but release is not gated on verification.
  • Third-party destruction certificates exist, but no chain-of-custody or asset list.

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: treating “sanitized” and “verified sanitized” as the same step.
    Fix: require a second approver, or at minimum a documented verification check separate from execution.

  2. Mistake: excluding appliances and “non-traditional” storage.
    Fix: scope “storage media” broadly and maintain a list of asset classes that contain embedded storage.

  3. Mistake: relying on third parties without enforceable evidence requirements.
    Fix: write evidence delivery into contracts and require asset-level manifests with certificates.

  4. Mistake: forgetting licensed software.
    Fix: add a SAM checkpoint to the workflow; treat license deactivation as required before disposition.

  5. Mistake: allowing urgent RMAs to bypass process.
    Fix: pre-approve RMA paths that keep drives in-house or require physical destruction; use exceptions only for true edge cases.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page avoids case claims. Practically, failures in secure disposal and re-use create three direct exposures: (1) data exposure if residual data is recoverable, (2) contractual breach if customer data handling commitments are violated, and (3) software licensing disputes if licensed software is transferred improperly. ISO/IEC 27017:2015 Clause 11.2.7 is designed to reduce these outcomes by requiring both sanitization and verification. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Practical execution plan (phased)

Immediate phase

  • Publish or update the sanitization standard to explicitly include cloud infrastructure equipment and verification.
  • Implement “Verified Sanitized” as a mandatory lifecycle state in ITAM/ticketing.
  • Identify all third parties touching equipment disposal, transport, recycling, repair, or resale, and inventory existing contracts and evidence flows.

Near-term phase

  • Deploy the media-type decision matrix and train operators on the minimum actions and what counts as verification evidence.
  • Update decommission/RMA workflows to include licensed software removal checks.
  • Start collecting per-asset evidence in a consistent repository (ticket attachments, GRC evidence store, or a dedicated control binder).

Ongoing phase

  • Run periodic sampling reviews: pick recent disposed and re-used assets, confirm traceability end-to-end.
  • Track exceptions, root causes, and recurrence. Fix upstream lifecycle gaps rather than approving repeat waivers.
  • Operationalize third-party oversight: confirm certificates are received, complete, and match asset manifests.

If you need a faster path to consistency across teams and third parties, Daydream can centralize the evidence requests, track per-asset artifacts, and keep disposal and re-use controls tied to the third parties who actually handle the equipment.

Frequently Asked Questions

Does this requirement apply only to physical servers and laptops, or also to storage arrays and appliances?

It applies to all equipment containing storage media, which includes arrays, appliances, removable media, and any embedded storage. Treat anything that can persist data as in scope under ISO/IEC 27017 Clause 11.2.7. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

What does “verified” mean in practice?

“Verified” means an accountable role confirms the sanitization outcome succeeded and matches the correct asset identifier before disposal or re-use. A completed wipe without a verification record is an audit gap for ISO/IEC 27017 Clause 11.2.7. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

How do we handle failed drives that cannot be securely overwritten?

Define an exception-free standard path such as physical destruction or controlled handling under strict third-party terms, then retain evidence (manifest, chain-of-custody, certificate). The key is that the asset cannot move to disposal or re-use without verified treatment and documentation. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Is full-disk encryption enough by itself?

Encryption helps, but the requirement still expects you to verify that data is removed or securely overwritten prior to disposal or re-use. If you rely on crypto-erase or key destruction, document the method and keep verification evidence tied to the asset. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

What evidence is “good enough” for auditors?

Auditors look for asset-level traceability: inventory record, decommission ticket, wipe/erase output, and a verification sign-off that references the same serial/asset tag. For third parties, add chain-of-custody and certificates that include an asset manifest. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

How do we prove licensed software was removed?

Add a required workflow step to deprovision the asset from license management systems and attach the resulting record to the decommission ticket. The clause explicitly includes licensed software, so treat this as mandatory evidence, not a “nice to have.” (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Frequently Asked Questions

Does this requirement apply only to physical servers and laptops, or also to storage arrays and appliances?

It applies to **all equipment containing storage media**, which includes arrays, appliances, removable media, and any embedded storage. Treat anything that can persist data as in scope under ISO/IEC 27017 Clause 11.2.7. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

What does “verified” mean in practice?

“Verified” means an accountable role confirms the sanitization outcome succeeded and matches the correct asset identifier before disposal or re-use. A completed wipe without a verification record is an audit gap for ISO/IEC 27017 Clause 11.2.7. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

How do we handle failed drives that cannot be securely overwritten?

Define an exception-free standard path such as physical destruction or controlled handling under strict third-party terms, then retain evidence (manifest, chain-of-custody, certificate). The key is that the asset cannot move to disposal or re-use without verified treatment and documentation. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Is full-disk encryption enough by itself?

Encryption helps, but the requirement still expects you to verify that data is removed or securely overwritten prior to disposal or re-use. If you rely on crypto-erase or key destruction, document the method and keep verification evidence tied to the asset. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

What evidence is “good enough” for auditors?

Auditors look for asset-level traceability: inventory record, decommission ticket, wipe/erase output, and a verification sign-off that references the same serial/asset tag. For third parties, add chain-of-custody and certificates that include an asset manifest. (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

How do we prove licensed software was removed?

Add a required workflow step to deprovision the asset from license management systems and attach the resulting record to the decommission ticket. The clause explicitly includes licensed software, so treat this as mandatory evidence, not a “nice to have.” (ISO/IEC 27017:2015 Information technology — Security techniques — Code of practice for information security controls based on ISO/IEC 27002 for cloud services)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27017: Secure disposal or re-use of equipment | Daydream