Skip to content
BlogDoD 5220.22-M Explained – Data Erasure Standards

DoD 5220.22-M Explained – Data Erasure Standards

SUMMARY: DoD 5220.22-M remains one of the most widely recognized standards for securely overwriting sensitive data. This guide explains how the DoD 3-pass and 7-pass wiping methods work, when they are required and why they still matter for compliance driven organizations. You’ll also learn how to apply DoD 5220.22-M in practice using tools such as BCWipe and BCWipe Total WipeOut to achieve reliable, verifiable data sanitization.

DoD 5220.22-M Data Erasure Standard

DoD 5220.22-M is one of the most recognizable and longest standing data erasure standards.

In this blog, you will find out everything you need to know about DoD 5220.22-M, including why you should use this particular wiping standard and how it can be implemented to erase hard drives or selected files.

A digital graphic with binary code in the background, featuring the title "Data Erasure Standards: DoD 5220.22-M Explained" and an icon of an open book with an information symbol. The image represents the Department of Defense standard for secure data erasure.

What Is the DoD 5220.22-M Wiping Standard?

DoD 5220.22-M is a widely used data erasure standard. In the media sanitization industry, a number of data erasure standards have been established over the last few decades to ensure wiping practices are secure and compliant with data protection regulations. These standards specify the overwrite patterns and paths that have been set by government agencies and organizations around the world.

The DoD 5220.22-M standard involves overwriting the previously stored data on drives with binary patterns of zeroes and ones. The process requires 3 secure overwriting passes.

The DoD 5220.22-M standard is most commonly known in this form:

  • Pass 1: Overwrite all addressable locations with binary zeroes
  • Pass 2: Overwrite all addressable locations with binary ones
  • Pass 3: Overwrite all addressable locations with a random bit pattern

The third overwrite pass is then verified by the wiping standard
In 2001, the U.S. Department of Defense (DoD) published theDoD 5220.22-M ECE method, which is a 7-pass version of the original standard that is executed in the following way:

  • Pass 1: Overwrite all addressable locations with binary zeroes
  • Pass 2: Overwrite all addressable locations with binary ones
  • Pass 3: Overwrite all addressable locations with a random bit pattern
  • Pass 4: Overwrite all addressable locations with binary zeroes
  • Pass 5: Overwrite all addressable locations with binary zeroes
  • Pass 6: Overwrite all addressable locations with binary ones
  • Pass 7: Overwrite all addressable locations with a random bit pattern

However, the older 3-pass method is the one most commonly used today and is often regarded as an industry-standard in the United States.

When Was DoD 5220.22-M Introduced?

DoD 5220.22-M is a data erasure standard that was published by the DoD in 1995 for institutions that require high levels of security, such as the Pentagon. At the time it was issued, the standard was regarded as a benchmark for secure data erasure.

Why Organizations Still Use DoD 5220.22-M Today

In case you’re feeling unsure, here’s 3 reasons why you should use the DoD standard:

DoD 5220.22-M as an Industry Standard

Despite the original version of the DoD 5220.22-M algorithm being almost 30 years old, it is still widely viewed as an industry standard for media sanitization. It may not be as comprehensive as some of the more advanced wiping schemes, but the DoD method has the advantage of taking considerably less time to finish running on your system than the likes of the Gutmann standard.

Verification & Data Recovery Prevention

Another benefit of the DoD 5220.22-M standard is the fact that it performs a verification at the end of every pass, which helps to ensure that data is overwritten correctly and securely. The DoD method also uses random characters to overwrite storage locations, which reduces the chance of data recovery.

Compliance & Regulatory Requirements

Most importantly, many government agencies and private organizations require the implementation of DoD 5220.22-M as part of their data erasure practice.

How to Implement the DoD 5220.22-M Standard with BCWipe

All trusted data erasure solutions should allow you to implement the DoD 5220.22-M standard. For example, Jetico offers 2 tools:

Both solutions support the 3-pass DoD standard and the 7-pass DoD 5220.22-M ECE method.

Other wiping schemes supported by BCWipe include the U.S. DoE M 205.1-2 standard and the NIST 800-88-1, 800-88-2 & 800-88-3 standards. See a full list of supported wiping schemes.

Get started with the DoD 5220-22-M standard by requesting a free trial of BCWipe.

Frequently Asked Questions (FAQs)

What Is the DoD 5220.22-M Standard Used For?

DoD 5220.22-M is used to securely erase data from storage media by overwriting existing information with defined bit patterns. Its purpose is to make previously stored data unrecoverable, even with forensic tools. The standard is commonly applied when retiring, reusing or disposing of storage devices.

Is DoD 5220.22-M Still Relevant Today?

Yes. Although it was introduced in 1995, the 3-pass DoD 5220.22-M method is still widely accepted, particularly in the United States. Many organizations continue to rely on it because it provides a strong balance between security, verification and execution time.

When Should I Use DoD 5220.22-M Instead of Other Wiping Standards?

You should use DoD 5220.22-M when compliance requirements or internal policies explicitly reference it, or when a proven and well understood wiping method is required. It is often selected over more complex standards when faster, verifiable data erasure is needed without unnecessary overhead.

Does DoD 5220.22-M Work on Both Entire Drives and Individual Files?

Yes, but this depends on how the wiping tool is implemented. Full drive wiping is typically used before device disposal or redeployment, while file level wiping is suitable for securely deleting sensitive files without affecting the rest of the system.

How Can Organizations Verify That DoD 5220.22-M Wiping Was Performed Correctly?

Verification is a key part of DoD 5220.22-M compliance. Organizations should use wiping tools that generate detailed erasure reports or certificates confirming the method used, the number of passes completed and the target device. These records support audits and demonstrate that data was erased according to policy.

Related Articles

Hardware Decommissioning Process: A 5-Step Checklist
Data Sanitization 5 Common Myths

CMMC 2.0 Levels, Controls & Framework for Media Sanitization Requirements
NIST SP 800-88 Guidelines for Media Sanitization Explained
IEEE 2883-2022 Standard for Sanitizing Storage
IRS Publication 4812 & How to Comply with Wiping Standards

How to Securely Wipe Your Windows 11 Computer Clean
The Ultimate Guide to Deleting Files Permanently
How to Obtain a Certificate of Destruction

Back to all Blogs

Enhance Your Data Protection Now

Request a free consultation with our data protection specialist to learn how our solutions can help you secure your endpoints.