🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Compliant Media Disposal Procedure for FCI: Checklist and Tools — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step‑by‑step guidance and a ready checklist for implementing a compliant Federal Contract Information (FCI) media disposal procedure that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 media protection requirements.

March 31, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Disposing of media that stores Federal Contract Information (FCI) is a high‑risk activity that must be handled consistently, documented, and aligned with FAR 52.204‑21 and CMMC 2.0 Level 1 (MP.L1‑B.1.VII) expectations; this post gives a practical checklist, real‑world small‑business examples, recommended tools and specific steps to implement a defensible media disposal program.

What the requirement means for your organization

At the Compliance Framework level, MP.L1‑B.1.VII and the FAR clause require organizations handling FCI to prevent unauthorized disclosure when media reach end‑of‑life. Practically, that means you must categorize FCI media, sanitize or destroy it using accepted methods, maintain evidence of the action (logs/certificates), and ensure procedures are repeatable and auditable. For small businesses this is often implemented as a single policy and an operations playbook that covers laptops, desktops, removable drives, paper, backup tapes, mobile devices, and cloud artifacts.

Practical implementation steps (high level)

Follow this structured approach: 1) Build a media inventory and classification, 2) Define approved sanitization and destruction methods mapped to media types, 3) Assign roles and chain‑of‑custody procedures, 4) Select tools and vendors, 5) Test and verify sanitization results, 6) Record and retain disposal evidence. Each step should be captured in a Media Disposal Procedure document and exercised during periodic internal audits.

Checklist: tangible actions you can implement this week

Use this checklist as the operational backbone of your procedure (treat each item as a line item to sign off):

  • Create a Media Inventory (asset tag, media type, owner, location, FCI indicator).
  • Classify media containing FCI and mark it in the inventory.
  • Map acceptable sanitization methods per NIST SP 800‑88 Rev. 1 (clear, purge, destroy) to each media type.
  • Decide on in‑house vs. third‑party disposal and document selection criteria (certifications: R2, e‑Stewards, NAID for shredders).
  • Implement chain‑of‑custody forms or digital logs for transfers and destruction events.
  • Verify sanitization (e.g., crypto‑erase success codes, target file checks, forensic verification spot checks) and attach evidence to the log.
  • Keep disposal records for a defined retention period (align with contract and company policy).

Tools and technical details — what to use and when

Choose tools appropriate to the media: for HDDs use ATA Secure Erase (hdparm), for SSDs prefer vendor‑supplied secure erase utilities or crypto‑erase by destroying encryption keys (LUKS/BitLocker key destruction), and avoid relying on zeroing alone for many SSDs due to wear‑leveling. Useful tools: hdparm, nvme-cli (nvme format with secure‑erase options), Blancco or Active@ KillDisk for certified wipes, and Microsoft SDelete for overwriting free space on Windows. For mobile devices, use an MDM to issue a remote wipe and remove device from management, then document wipe confirmation. For cloud resources, use provider APIs to securely delete objects and destroy associated encryption keys; obtain CSP attestation where available.

Paper, tapes, and physical destruction

Paper should be cross‑cut shredded to P‑4/P‑5 standards or handled through a certified shredding vendor with a certificate of destruction. Backup tapes and optical media often require degaussing followed by physical shredding or crushing; tape drives and media should be logged and certificates from the recycler retained. For small businesses with low volume, on‑site shredders (capable of P‑4 min) and a locked media quarantine bin for expired assets are cost‑effective measures.

Real‑world small business scenarios

Scenario 1: A 12‑person engineering subcontractor rotates laptops every 3 years. Implementation: enable BitLocker with TPM+PIN, maintain an asset register, before redeploying use Windows "Reset and sanitize" and then perform a factory image plus ATA Secure Erase for SSDs or crypto‑erase by deleting keys; retain a record showing asset tag, method (crypto‑erase), operator initials and date. Scenario 2: A small managed services firm has legacy backup tapes. Implementation: identify tapes with FCI, schedule them for degauss and shredding via an NAID‑certified vendor, log serial numbers and attach the vendor's certificate of destruction to the contract file.

Verification, evidence and audit readiness

Verification is critical — always produce artifacts that an auditor can check. Examples: sanitized disk serial numbers and output of secure‑erase commands, screenshots of MDM wipe confirmation, NAID certificates for shredding runs, signed chain‑of‑custody logs. Periodically perform forensic spot checks (e.g., attempt to mount sanitized disks in a controlled lab) and record results. Integrate disposal reporting into your compliance dashboard so leadership can see trends (e.g., number of assets sanitized per quarter) and auditors can sample records easily.

Risks of not implementing a compliant media disposal procedure

Failure to properly dispose of FCI can lead to unauthorized disclosure, loss of competitive information, contract termination, exclusion from future government work, and reputational damage. Technically, residual data on improperly sanitized storage (especially SSDs with wear‑leveling or cloud snapshots retained) can be recovered, enabling attackers to access project details, credentials, or personally identifiable information. Legal and financial consequences range from breach notifications to contract sanctions under FAR clauses.

Compliance tips and best practices

Key best practices: adopt NIST SP 800‑88 as the baseline, use encryption in production so crypto‑erase is an accepted rapid sanitization method, centralize media disposal so the process is consistent, use certified destruction vendors for high‑risk media, and ensure role separation (different personnel record inventory vs. perform destruction). Train staff on recognizing FCI and maintaining chain‑of‑custody — human error is the most common failure point. Finally, bake disposal steps into your offboarding checklist so departing employees don't take assets containing FCI off the compliant path.

In summary, implementing a compliant media disposal procedure for FCI requires a documented policy, an actionable checklist, appropriate technical methods for each media type, verification and recordkeeping, and vendor/chain‑of‑custody controls; for small businesses these steps are practical and cost‑effective and will materially reduce the risk of data leakage while aligning with FAR 52.204‑21 and CMMC 2.0 Level 1 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes