In conjunction with leading forensic test facilities and under the oversight of Professor Andrew Blyth the ADISA product claims test service is designed to help verify the claims made about data sanitisation tools.
Each test has a published test methodology which controls the testing process for test claim. The testing process is underpinned by the ADISA Threat Matrix. The threat matrix defines a series of capabilities and risks that various threat agents can pose on the security of a device. The test levels define a series of capabilities that a threat actor/agent may wish to bring against a media type and are outlined in the table below.
For any organisation dealing with UK protective marking information this scheme is NOT for use in those situations. Please refer to CESG or CPNI for approved products.
|ADISA RISK LEVEL||THREAT ACTOR & COMPROMISE METHODS||ADISA TEST LEVEL|
|1 (Very Low)||Casual or opportunistic threat actor only able to mount high-level non-invasive and non-destructive software attacks utilising freeware, OS tools and COTS products.||1|
|2 (Low)||Commercial data recovery organisation able to mount non-invasive and non-destructive software attacks and hardware attacks.||1|
|3 (Medium)||Commercial computer forensics organisation able to mount both non-invasive/non-destructive and invasive/destructive software and hardware attack, utilising COTS products.||2|
|4 (High)||Commercial data recovery and computer forensics organisation able to mount both non-invasive/non-destructive and invasive/ destructive software and hardware attack, utilising both COTS and bespoke utilities.||2|
|5 (Very High)||Government-sponsored organisations using advanced techniques to mount all types of software and hardware attacks with unlimited time and resources to recover sanitised data.||3|