← Back to Projects
Defence / Government / EnterpriseRegulated SystemsProduct Development

Slate: Certified Data Sanitisation Platform

A hardware appliance and bootable software platform that sanitises any storage media to the standards that defence, government, and enterprise auditors require, with tamper-evident certificates and zero cloud dependency.

<90s

256GB NVMe wipe + verify

4

Simultaneous drives

-80%

Cost vs. external vendor

6

Compliance standards

0

Cloud dependency (air-gapped)

1

The Problem

Every organisation that handles sensitive data eventually needs to sanitise storage media. Drives get decommissioned, laptops get returned at end of lease, servers get retired, classified systems get dismantled. The data on those drives needs to be irrecoverably destroyed to a standard that satisfies auditors.

The standards are unambiguous. NIST 800-88 Rev 1 defines Clear, Purge, and Destroy methods for different media types and sensitivity levels. The Australian Government ISM mandates specific sanitisation controls. ASD publishes media destruction guidelines that defence and intelligence agencies must follow. These aren't optional. Non-compliance is an audit finding, a security incident, or worse.

Most organisations handle data sanitisation badly. The options are grim: pay an external vendor $15-50 per drive (expensive, slow, no real-time visibility), use free tools like DBAN that produce no audit trail (non-compliant), or trust an intern with a USB stick and a prayer.

Defence and government organisations face a harder version of this. Classified media can't leave the facility. Air-gapped environments can't upload certificates to the cloud. And every sanitisation event needs to be tied to an authenticated operator with a tamper-evident record that survives audit scrutiny.

2

What We Built

Slate is a complete data sanitisation platform in two form factors, a dedicated hardware appliance and a bootable software image, backed by a cloud certificate management portal. It handles every media type, meets every relevant standard, and works in both connected and air-gapped environments.

The design philosophy: make the right thing the easy thing. Operators don't need to know which sanitisation method to use. Slate detects the drive type and selects the appropriate method automatically. They don't need to remember to generate a certificate, because it happens on every wipe. They don't need to manually enter drive details: the barcode scanner links physical assets to digital records in one tap.

We built this because no existing product covered the full matrix: all media types × all standards × both environments × tamper-evident audit × ease of use. Enterprise tools were expensive and complex. Open-source tools were capable but produced nothing an auditor would accept. Slate sits in the gap.

3

Two Form Factors, One Engine

The same sanitisation engine and compliance logic powers both form factors. The Appliance is for dedicated sanitisation operations. Boot is for wiping machines in place.

Slate Appliance

Dedicated hardware unit. Rugged aluminium enclosure with universal media bays.

PlatformRK3588, custom embedded Linux
MediaSATA, SAS, NVMe, U.2, USB, SD, CF
Simultaneous4 drives
Interface7" touchscreen + thermal printer
AuthNFC badge / PIN
ConnectivityEthernet, Wi-Fi, USB export

Best for

  • Dedicated sanitisation stations
  • IT asset disposal operations
  • Classified environments (air-gapped)
  • High-throughput batch processing

Slate Boot

Bootable Linux environment via USB or PXE. Turns any x86 machine into a sanitisation station.

Platformx86_64, bootable Linux
DeliveryUSB stick or PXE network boot
MediaInternal drives (SATA, NVMe)
InterfaceText UI or web dashboard
AuthPIN / network credentials
ConnectivityEthernet (PXE + cert upload)

Best for

  • End-of-lease laptop fleets
  • Workstation redeployment
  • Server decommissioning
  • In-place wipe without drive removal
Figure 1. Slate Appliance vs. Slate Boot — specifications, capabilities, and use cases.
Slate Appliance touch interface
Slate Boot terminal interface
Figure 2. Left: Slate Appliance touch interface showing drive detection, SMART diagnostics, and erase controls. Right: Slate Boot terminal interface running on a target machine via USB/PXE.
4

Appliance Hardware

The Slate Appliance packs a serious amount of capability into a compact, rugged unit. The RK3588 SoC provides more than enough processing power for concurrent sanitisation operations, while the peripheral ecosystem handles the full operator workflow, from authentication to labelling.

SATA connectors on the Slate Appliance PCB
Slate Appliance PCB — SATA connector array for multi-drive simultaneous sanitisation.

Processing

RK3588 SoC8-core ARM, 6 TOPS NPU
7" TouchscreenCapacitive, glove-friendly

Media Interfaces

SATA × 22.5" / 3.5" HDD & SSD
SAS × 1Enterprise drives
M.2 NVMe2230 / 2242 / 2280
U.2Enterprise NVMe
USB-A / USB-CFlash drives, external
SD / microSD / CFCard reader bay

Peripherals

NFC ReaderOperator badge auth
Barcode ScannerAsset tag linking
Thermal PrinterPer-drive label + QR
Camera (opt.)Physical destruction evidence

Connectivity

EthernetCertificate upload, PXE
Wi-Fi 6Optional wireless sync
USB ExportAir-gapped cert transfer
Figure 3. Slate Appliance hardware architecture — processing, media interfaces, peripherals, and connectivity.
5

Automatic Method Selection

Different media types require different sanitisation methods. You can't overwrite an NVMe SSD the same way you overwrite a spinning hard drive. The wear-levelling controller and over-provisioned NAND mean a block-level overwrite may not reach every physical cell. NVMe Format with cryptographic erase is the correct approach.

Slate handles this automatically. When a drive is connected, the system identifies the interface type, queries the drive's capability set, and selects the most effective sanitisation method that meets the configured compliance level. Operators see a clear confirmation of what will happen before it starts, but they don't need to make the technical decision themselves.

Every method concludes with a full verification pass: a block-level read of the entire drive to confirm the sanitisation was complete. No certificate is issued unless verification passes. A failed verification triggers an automatic re-wipe and alert.

6

Operator Experience

We obsessed over the operator experience. Most data sanitisation tools look and feel like compliance teams built them. The UIs are dense, the workflows are confusing, and the error messages read like legal briefs.

Slate's touchscreen interface is designed for the person doing the work, often an IT support technician, a warehouse operator, or a volunteer at a device recycling charity. Big touch targets. Clear status indicators (colour-coded: blue for in progress, green for passed, red for failed). Plain-English confirmations at every step.

The NFC badge tap for authentication means operators don't need to type passwords on a touchscreen. The barcode scanner links the physical asset tag to the digital record without manual data entry. The thermal printer sticks a label on the drive the moment it passes, with a QR code that links directly to the certificate in Slate Cloud.

The full workflow (badge tap, connect drive, scan asset tag, confirm wipe, wait, print label) takes under 90 seconds for a typical NVMe SSD including the verification pass.

Drive Connected

Auto-detect type, capacity, capabilities

NVMe SSD

Method

NVMe Format + Crypto Erase

Standard

NIST 800-88 Clear/Purge

Typical time

~15s / 256GB

SATA SSD

Method

ATA Secure Erase

Standard

NIST 800-88 Purge

Typical time

~45s / 256GB

HDD (magnetic)

Method

Multi-pass overwrite (1/3/7)

Standard

NIST 800-88 Clear

Typical time

~25 min / 1TB (3-pass)

Flash media

Method

Full overwrite + verify

Standard

NIST 800-88 Clear

Typical time

~30s / 128GB

Block-level Verification Pass

Every sector read back and verified · Certificate generated on pass · Failure triggers re-wipe

Figure 4. Sanitisation method auto-selection based on detected drive type. All methods include a verification pass.
7

A Wipe in 80 Seconds

A typical sanitisation operation on the Appliance, a single 256GB NVMe SSD, runs from badge tap to printed label in about 80 seconds.

0:00

Operator taps NFC badge

Identity verified, session started

0:03

Drive connected, auto-detected

Samsung 970 EVO Plus, 256GB NVMe, M.2 2280

0:05

Asset tag scanned

Linked to CMDB record AST-2024-00847

0:08

Method selected: NVMe Format + Crypto Erase

Auto-selected based on drive capabilities

0:10

Sanitisation in progress

Cryptographic erase command issued

0:25

Verification pass running

Block-level read of entire drive, confirming zero state

1:18

PASS — Certificate generated

Certificate ID: SLT-2026-00392, SHA-256 signed

1:20

Label printed, cert uploaded

QR code links to Slate Cloud certificate

Total: 1 min 20 sec — 256GB NVMe, including verification
Figure 5. Complete sanitisation operation timeline — Samsung 970 EVO Plus 256GB NVMe. 80 seconds end-to-end.
8

Slate Cloud

A certificate is only useful if you can find it three years later at audit time. Slate Cloud is a web portal that stores every sanitisation certificate in a centralised, searchable, tamper-evident ledger.

Every certificate is cryptographically signed at generation (SHA-256 hash + RSA-2048 signature) and stored in an append-only data structure. Certificates cannot be modified or deleted after creation. The integrity of the ledger is verifiable by any auditor with the public key.

For air-gapped environments, certificates are stored locally on the Appliance and exported via encrypted USB transfer. When the USB is connected to a network-accessible machine, certificates sync to Slate Cloud automatically. The chain of custody is maintained throughout. Every certificate includes the timestamp, operator ID, device details, method used, and verification result, regardless of how it reached the portal.

The portal provides fleet-wide visibility for compliance officers and IT managers: how many drives have been sanitised this quarter, by which operators, using which methods. Anomaly detection flags unusual patterns: a sudden spike in failed wipes, an operator sanitising drives outside business hours, a device serial number that appears twice.

Audit-ready report generation exports data in the formats that NIST, ISM, and ASD assessors expect. No manual compilation, no spreadsheet wrangling. Click, download, hand to auditor.

The portal also exposes a REST API for integration with existing ITSM and CMDB platforms: ServiceNow, Jira Service Management, Freshservice. When a laptop is flagged for decommission in your ITSM, the sanitisation status can be tracked and verified programmatically without logging into a separate portal.

Wipe completes

Certificate generated locally

Crypto-signed

SHA-256 + RSA-2048 signature

Upload to Slate Cloud

Or queue for USB sync (air-gapped)

Portal stores cert

Append-only, tamper-evident ledger

Certificate Search

Find any cert by serial, asset tag, operator, or date range

Fleet Dashboard

Organisation-wide sanitisation activity at a glance

Compliance Reports

Audit-ready exports for NIST, ISM, ASD assessors

Role-Based Access

Operators, compliance officers, auditors — each sees what they need

API Access

Integrate with ITSM, CMDB, and asset management systems

Anomaly Alerts

Flagged: failed wipes, unsigned certs, unusual patterns

Figure 6. Certificate lifecycle and Slate Cloud portal capabilities.
9

Compliance Coverage

Slate was designed against the standards from the start, not retrofitted for compliance after the fact. Every sanitisation method, every logging decision, every certificate field exists because a standard requires it.

StandardScopeSlate CoverageStatus
NIST 800-88 Rev 1US federal media sanitisationClear, Purge, and Destroy (with evidence)
ISM (Australian Gov)Information Security Manual controlsMedia sanitisation controls, audit trails, operator accountability
ASD Media GuidelinesASD media destruction & sanitisationMethod selection per classification level, verification passes
DoD 5220.22-MUS DoD clearing & sanitisation3-pass and 7-pass overwrite methods available
HB171Australian Govt ICT media handlingEnd-to-end chain of custody, certificate management
ISO 27001ISMS asset disposal (A.8.3.2)Auditable sanitisation records, tamper-evident logs
Table 1. Compliance standard coverage — Slate supports the full requirements of each listed standard.
10

Results

Slate is in production use across defence contractors, government agencies, and enterprise IT departments in Australia. The Appliance runs in IT disposal rooms, security cages, and warehouse loading docks. Slate Boot runs across end-of-lease laptop fleets at companies that process thousands of device returns per quarter.

Early adopters report an 80% reduction in per-drive sanitisation cost compared to external vendors. More importantly, they now have complete traceability: every drive, every wipe, every certificate, searchable and auditable. Several organisations have used Slate Cloud reports to pass compliance audits that previously required weeks of manual evidence compilation.

One defence contractor told us their previous process involved boxing up drives, couriering them to a vendor, waiting two weeks for certificates, and manually entering the results into a spreadsheet. With Slate, the same drives are sanitised on-site in an afternoon, and the certificates are in the portal before the operator finishes their shift.

The air-gapped deployment model has been particularly well-received in defence environments. The ability to operate with zero network connectivity, and sync certificates later via encrypted USB, solves a problem that no other product in the market addresses well.

We're currently developing Slate Destroy, an extension for physical destruction verification. A camera module photographs the destroyed media, generates an evidence package, and links it to the same certificate chain, closing the last gap in the audit trail for media classified at levels that require physical destruction.

Technology Stack

Appliance

  • RK3588 SoC (custom Linux)
  • Yocto-based embedded OS
  • Qt6 touchscreen UI
  • SQLite local cert store

Boot Image

  • Custom Linux (x86_64)
  • PXE + USB boot
  • Text UI + web dashboard
  • Network cert upload

Sanitisation Engine

  • ATA Secure Erase
  • NVMe Format (crypto)
  • Multi-pass overwrite
  • Block-level verification

Slate Cloud

  • Next.js + TypeScript
  • PostgreSQL (Neon)
  • RSA-2048 cert signing
  • REST API + webhooks

Need compliant data sanitisation without the vendor lock-in?

You have a hard problem. We should talk.