🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Choose Tools and Techniques to Properly Sanitize Hard Drives and Removable Media — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical guidance for selecting tools and processes to sanitize hard drives and removable media to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

April 10, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Proper sanitization of hard drives and removable media is a must for any organization that handles Federal Acquisition Regulation (FAR) covered information and wants to satisfy CMMC 2.0 Level 1 control MP.L1-B.1.VII; picking the right tools and techniques requires matching media type, threat model, and evidence requirements to proven methods so you can both reduce risk and produce audit-ready records.

Understand the compliance and technical baseline

FAR 52.204-21 requires contractors to safeguard federal information on contractor systems, and CMMC 2.0 Level 1 MP.L1-B.1.VII addresses media protection including sanitization before disposal or reuse. NIST SP 800-88 (Guidelines for Media Sanitization) is the de facto technical baseline: it defines three outcomes—Clear (logical sanitization/overwrite), Purge (deeper sanitization such as degauss or crypto-erase), and Destroy (physical destruction). Your tool and technique selection must map to these outcomes and to the sensitivity of the data (e.g., Federal Contract Information vs. Controlled Unclassified Information).

Match method to media type and sensitivity

Not all media are created equal: spinning hard drives (HDDs), solid-state drives (SSDs), USB flash drives, SD cards, and optical media each require different approaches. For HDDs, software overwrites (Clear) or ATA Secure Erase (Purge) are effective; DBAN (Darik's Boot and Nuke) is still useful for older HDDs but is not suitable for SSDs. For SSDs and NVMe devices use vendor secure-erase tools or the drive's built-in secure erase (e.g., hdparm --security-erase for ATA drives, nvme format --security-erase or nvme-cli for NVMe) or rely on crypto-erase for self-encrypting drives (SEDs). For removable flash media, prefer cryptographic protection or physical destruction because wear-leveling can prevent reliable overwriting.

Practical implementation steps for a small business

Implement a simple process: 1) Inventory and classify devices (maintain a CMDB that records serial numbers, owner, and data classification). 2) Apply pre-sanitation measures—if the device was used for sensitive data, place it in restricted storage. 3) Choose the method: Clear for low-sensitivity, Purge for moderate/high-sensitivity, Destroy for the highest risk or end-of-life. 4) Execute using the correct tool and record results (who did it, when, method, tool/version, device ID). 5) Verify via sampling or forensic checks and retain a certificate of destruction for disposed devices. For example, a small defense subcontractor can require FDE on all new laptops and perform crypto-erase (delete the encryption key) at retirement, while using a certified destruction vendor for older unencrypted SSDs.

Specific technical tools and commands (examples)

Use vendor and platform-supported commands when possible. Examples: for ATA HDDs, secure-erase via hdparm:

hdparm --user-master u --security-set-pass password /dev/sdX
hdparm --security-erase password /dev/sdX
For NVMe:
nvme format /dev/nvme0n1 -s 1
For SEDs use sedutil or vendor management tools to perform a cryptographic erase (crypto-erase). Avoid using overwrite-only tools on SSDs (DBAN or simple dd) because of wear-leveling; instead use vendor secure-erase or physical destruction. For verification, sample reads with forensic tools (e.g., FTK Imager, Autopsy) or use hexdump/strings to ensure no readable remnants remain; for crypto-erase verification, verify the device no longer returns accessible partitions or the drive returns random data patterns.

Use of third-party destruction and certificates

If you outsource destruction, vet vendors for chain-of-custody, on-site destruction capabilities, and written certificates of destruction (CoD) that include device serial numbers. For small businesses without in-house shredders or crushers, use an NAID AAA-certified vendor when handling high-value or regulated media. Maintain vendor contracts and CoDs as audit evidence for FAR/CMMC assessments. When contracting destruction, require witnessing options and request a detailed manifest listing each device by ID.

Risk of non-compliance and practical compliance tips

Failing to sanitize media properly risks data breach, disclosure of covered contractor information, contract penalties, loss of future government work, and reputational harm. Practical compliance tips: default to full-disk encryption on all endpoint devices so retirement can be simplified with crypto-erase; document standard operating procedures that map sanitization methods to data sensitivity; maintain logs, screenshots, or tool output as evidence; train personnel on approved tools and chain-of-custody procedures; and run periodic audits (e.g., quarterly spot checks) using forensic read tools to confirm processes are followed.

Conclusion

Selecting the right tools and techniques to sanitize hard drives and removable media for FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII compliance requires an inventory-driven policy, NIST 800-88-based method selection (Clear, Purge, Destroy), using platform-appropriate secure-erase or cryptographic methods for SSDs and NVMe, and producing verifiable records and certificates of destruction; small businesses can pragmatically reduce risk by enforcing full-disk encryption, maintaining simple SOPs, and either investing in the correct in-house tools or qualifying reputable destruction vendors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes