Traditional hard disk drives (HDDs) store data on magnetic platters. Overwriting every sector is straightforward — the write head passes over every location, and verification confirms the data is gone.
Solid-state drives don't work that way. SSDs use flash memory managed by an internal controller that distributes writes across cells to extend the drive's lifespan — a process called wear leveling. SSDs also maintain over-provisioned space (extra capacity not visible to the operating system) and may retain data in hidden reserves even after a full overwrite.
This means a traditional multi-pass overwrite can miss data on an SSD. The overwrite command goes to the controller, which writes to the cells it chooses — not necessarily the cells that held your sensitive data.
The solution is cryptographic erase. Modern SSDs encrypt all data by default using a key stored in the drive's firmware. Cryptographic erase destroys that key, making the entire contents of the drive — including data in wear-leveled cells, over-provisioned space, and hidden reserves — permanently unreadable. This is the NIST Purge method for flash-based media, and it's what we use on every SSD and NVMe drive we process.
For SSDs that don't support cryptographic erase (older or budget models), we escalate to NIST Destroy — physical destruction.