🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to implement low-cost secure media destruction for small contractors — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, low-cost methods and step-by-step controls for small contractors to securely sanitize and destroy media and meet FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) requirements.

April 04, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small contractors can implement affordable, practical media destruction and sanitization processes to meet Compliance Framework obligations under FAR 52.204-21 and CMMC 2.0 Level 1 (Control MP.L1-B.1.VII), with step-by-step actions, technical examples, and low-cost tools you can start using today.

Why this requirement matters (Compliance Framework context)

FAR 52.204-21 requires contractors to provide adequate security for Federal Contract Information (FCI) and to protect it from unauthorized disclosure; CMMC 2.0 Level 1 control MP.L1-B.1.VII further requires that media containing sensitive information be sanitized or destroyed before disposal or reuse. For small contractors, meeting these controls is not only a contractual obligation but a practical defense against data leaks, loss of contracts, and reputational harm.

Practical implementation steps — start with policy and inventory

Begin by documenting a simple Media Disposition Policy that maps to the Compliance Framework: define media types in-scope (paper, HDD, SSD/NVMe, USB/SD, mobile devices, removable optical media), roles and responsibilities (who is authorized to sanitize/destroy), retention periods, and required records (disposition log, chain-of-custody, Certificate of Destruction). Maintain a lightweight inventory: asset tag, serial number, date placed in service, last user, and disposition status. Even a spreadsheet with controlled access satisfies small-business practicality.

Sanitization and destruction methods — match method to media type

Use NIST SP 800-88 Rev. 1 principles adapted for small businesses: choose Clear (logical overwrite) for magnetic HDDs when feasible, and Purge/Destroy for SSDs and mobile flash where overwriting may not reliably remove data. For paper, use cross-cut shredding or secure off-site shredding. For HDDs you can use one-pass overwrite tools or trusted utilities such as DBAN for older spinning disks (note: DBAN is not recommended for SSDs). Example command for ATA Secure Erase on a Linux system (HDD/SSD-aware): hdparm --user-master u --security-set-pass p /dev/sdX && hdparm --user-master u --security-erase p /dev/sdX — only use on devices you own and after reading vendor docs.

Low-cost technical options and device-specific guidance

Small contractors can lean on inexpensive, effective techniques: enable full-disk encryption at deployment (BitLocker on Windows, FileVault on macOS, LUKS on Linux) and then perform a cryptographic erase (destroy the keys) at decommission — this is fast and low-cost. For SSDs/NVMe, use vendor tools or nvme format /dev/nvme0n1 -s 1 (crypto erase) or sedutil for self-encrypting drives; avoid relying on overwrite-only tools. For removable USB/SD media, a secure overwrite (single-pass) is acceptable for inexpensive flash, but when in doubt physically destroy (cut, shred, or puncture) or treat as e-waste for certified destruction. For mobile phones, perform a factory reset only if the device was encrypted during use; otherwise remove the storage and physically destroy, or use a certified recycler.

Low-cost physical and service options — what to buy or outsource

Budget-friendly equipment and services: a cross-cut shredder for paper ($50–$300), a small hard-drive shredder or drill/hammer for physical destruction (DIY method but document chain-of-custody), and local e-waste recyclers that provide Certificates of Destruction (CoD) for a small fee. Many municipal or private recyclers will accept business e-waste and issue a CoD; ask for NAID or R2 certification if you can afford a slightly higher cost. If outsourcing, require the recycler to sign a simple chain-of-custody form (asset ID, serial, method, date, operator) and retain CoD in your compliance file.

Real-world examples and scenarios for small businesses

Example A — Two-person software contractor: laptops are deployed with BitLocker and company-managed keys. When a laptop is retired, IT removes it from inventory, revokes keys and documents the crypto-erase event in the disposition log; for added assurance the SSD is physically destroyed if the device handled FCI. Example B — Field engineer with USB test drives: the firm issues USBs labelled "FCI" and requires return. Returned USBs are recorded, a single-pass overwrite performed on a dedicated, air-gapped workstation, and the action logged. Example C — Consultant with mixed media: paper containing FCI is shredded onsite and placed in locked bags for an NAID-certified shredder pickup monthly; receipts and CoDs are filed against the project number.

Compliance tips and best practices

Keep implementation simple and auditable: (1) write a short procedure that maps each media type to one approved destruction method, (2) train staff on handling and returning media, (3) maintain a disposition log (date, asset/serial, owner, method, operator signature), and (4) schedule periodic spot audits to confirm processes are followed. Deploy full-disk encryption at issuance to simplify end-of-life sanitization. Include disposition requirements in subcontracts and purchase orders so partners follow the same controls. Retain Certificates of Destruction and chain-of-custody records for the contractually-required period.

Risks of not implementing secure media destruction

Failing to sanitize or destroy media increases the risk of accidental disclosure of FCI and other sensitive information, which can result in loss of contracts, administrative fines, damaged reputation, and potential personal liability in case of a breach. Operationally, an unplanned data leak can trigger breach notifications, costly forensic response, and suspension from bidding on future government work — consequences that far exceed the modest cost of proper media disposition.

Summary: small contractors can meet FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) affordably by documenting a simple policy, using full-disk encryption at deployment, matching sanitization methods to media type (crypto-erase or physical destruction for SSDs, overwrite for HDDs, shredding for paper), maintaining chain-of-custody and Certificates of Destruction, and training staff — practical steps that reduce risk and produce a clear audit trail without large capital expense.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes