🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Media Sanitization SOP for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: Templates, Checklist, and Implementation Steps

Step-by-step guidance and ready-to-use templates to build a media sanitization SOP that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII compliance for small businesses.

•
April 12, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Creating a clear, practical media sanitization Standard Operating Procedure (SOP) is one of the fastest ways a small business can demonstrate compliance with FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII; this post gives an actionable SOP template, verification checklist, step-by-step implementation plan, and real-world examples you can adopt immediately.

Scope, mapping to the Compliance Framework, and key objectives

This SOP should explicitly map to the Compliance Framework requirement (FAR 52.204-21 basic safeguarding and the CMMC 2.0 Level 1 media protection control MP.L1-B.1.VII). Its key objectives are to: (1) identify and inventory media that may contain covered contractor information, (2) apply appropriate sanitization methods prior to reuse or disposal, (3) document sanitization and disposal activities, and (4) provide verifiable evidence of compliance during audits. Scope typically includes electronic storage media (laptops, desktops, SSD/HDD, USB drives, smartphones, backup tapes), embedded storage in printers/MFPs, and physical media such as paper and optical discs.

SOP template you can copy and customize

1) Header and Purpose

Title: Media Sanitization SOP | Version: 1.0 | Effective Date: YYYY-MM-DD. Purpose: Define required methods for sanitizing, disposing, and documenting media containing Covered Contractor Information (CCI) to meet FAR 52.204-21 and CMMC 2.0 MP.L1-B.1.VII.

2) Roles & Responsibilities

Information Owner: Classify media and authorize disposal; IT Administrator: execute sanitization procedures and maintain logs; Facilities/Reception: hold media quarantined until sanitization; Compliance Officer: perform periodic audits and retain certificates of destruction. Include escalation contacts and an approver signature block for final destruction of sensitive media.

3) Media-specific Procedures

HDD (magnetic hard drives): Use a certified full-disk overwrite tool (one-pass zeroing acceptable for non-highly sensitive CCI per NIST guidelines) or physical destruction. SSD/NVMe/Embedded flash: prefer vendor firmware secure-erase or cryptographic erase (e.g., PSID revert, NVMe Sanitize) because single overwrite is unreliable on SSDs; if not possible, physically destroy. Removable media (USB/thumb drives): perform a secure erase utility appropriate to the device or physically destroy. Mobile devices: perform factory reset + cryptographic erase if device uses storage encryption; remove SIM and SD cards and treat separately. Printers/MFPs: assume internal HDDs contain images—follow vendor procedure to sanitize or remove and follow HDD/SSD rules. Paper: cross-cut shredding to security level P-4 or higher or use incineration service with certificate of destruction.

Recordkeeping, verification, and evidence

Maintain a Media Sanitization Log (electronic or paper) with at minimum these fields: Media ID (asset tag or serial), Media Type, Owner/Department, Reason for sanitization, Method used (e.g., ATA Secure Erase, NVMe Sanitize, Overwrite, Physical Destruction), Tool/Service Provider, Date/Time, Operator, Verification Method (e.g., vendor tool success message, forensic check result), Disposal Location, and Approver signature. Store logs for the contractually required retention period. Where an external destruction vendor is used, obtain and retain a signed Certificate of Destruction that references media IDs when possible.

Practical implementation steps and checklist

Follow these steps to implement the SOP: 1) Inventory all media and tag items with asset IDs; 2) Classify media that may contain CCI; 3) Select sanitization methods per media type and document acceptance criteria (e.g., "NVMe Sanitize returns success code 0"); 4) Procure tools or vendor services (certified shredders, NVMe/ATA utilities, forensic verification tools); 5) Train staff and assign roles; 6) Pilot the procedures on small sample and validate with a forensic check; 7) Update SOP and roll out enterprise-wide; 8) Schedule periodic re-audits. Use this quick checklist during execution: confirm asset tag, quarantine media, record pre-sanitization owner, apply method, capture verification evidence (screenshot or vendor cert), store log, and secure disposal.

Small-business scenarios and real-world examples

Example A — Retiring a laptop: IT images the disk for records, performs a vendor-supported NVMe sanitize (or a cryptographic erase if the drive is encrypted), documents the sanitize success output, then recycles the chassis; if sanitize fails, remove the drive and physically shred it and retain destruction certificate. Example B — Employee USB turns up in lost-and-found: Quarantine and treat as potential CCI, attempt trusted secure-erase tool; if device integrity is unknown, physically destroy. Example C — Managed print services: Before contract turnover, require vendor provide proof of internal HDD sanitization or remove HDD and handle per SOP. These examples highlight low-cost paths (e.g., adopting full-disk encryption with key destruction as an additional sanitization control) suitable for small businesses with limited budgets.

Risks of non-implementation and compliance tips / best practices

Failing to implement a media sanitization SOP increases risk of data exposure, contract noncompliance, reputational harm, and potential loss of government contracts. Common pitfalls include relying on simple file deletion, overwriting SSDs improperly, or lacking proof of destruction. Best practices: (1) Prefer preventative controls such as full-disk encryption so cryptographic erasure is feasible, (2) follow NIST SP 800-88 Rev.1 guidance (Clear, Purge, Destroy) and vendor-specific erase tools, (3) document every action with timestamps and operator identity, (4) use third-party destruction services with certificates when cost-effective, and (5) include sanitization steps in employee offboarding and asset retirement workflows.

Summary

To meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII, produce a concise media sanitization SOP that maps roles, media types, approved methods, verification criteria, and retention of records; implement via a prioritized inventory, pilot testing, staff training, and routine audits. Use the provided template language, checklist steps, and small-business examples above to quickly operationalize the SOP and reduce the risk of data leak or contractual noncompliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes