🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Implement Media Sanitization for Federal Contract Information: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII (Step-by-Step Guide)

Step-by-step guidance for small businesses to implement media sanitization that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII, including practical tools, procedures, and audit evidence.

β€’
April 11, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Federal Contract Information (FCI) requires careful handling at end-of-life to prevent leakage β€” FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII require that contractors sanitize and dispose of media containing FCI; this post gives a practical, step-by-step implementation guide for small businesses to meet that requirement with defensible processes, tools, and audit evidence.

What the control requires (quick overview)

The key objective of MP.L1-B.1.V.II is simple: media that has contained FCI must be rendered unreadable or otherwise disposed of so that data cannot be recovered. In practice this maps to establishing a media inventory, selecting and applying appropriate sanitization methods (per NIST SP 800-88 guidance and CMMC expectations), documenting the process, and retaining proof (logs, certificates of destruction, chain-of-custody) so you can demonstrate compliance during audits or contract reviews.

Step-by-step implementation for Compliance Framework

Step 1 β€” Inventory and classify media

Begin with a complete inventory: list each asset (serial number, make/model, owner, location, media type) that may contain FCI β€” laptops, desktops, removable USB drives, external HDD/SSD, backup tapes, SD cards, embedded controllers, and storage in virtual machines/snapshots. For a small business example, an IT consultancy with 12 laptops and two NAS units should tag each device, record the storage type (HDD vs SSD), record what FCI (if any) was present, and mark whether the device is for redeploy, recycle, or destruction. Classification drives the sanitization method β€” media that only contained transient FCI and used full-disk encryption has different options than an unencrypted backup tape.

Step 2 β€” Select appropriate sanitization methods

Match the method to the media type and risk. NIST SP 800-88 Rev.1 categorizes methods: Clear (logical overwrites), Purge (cryptographic erase, block erase, degauss), and Destroy (shredding, incineration). Practical rules: use overwrites or built-in secure erase for magnetic HDDs; use ATA Secure Erase / NVMe Format or vendor tools for SSDs (overwriting can be ineffective on many SSDs); use cryptographic erase when full-disk encryption was applied from deployment (destroying keys is fast and verifiable); degauss backup tapes with an approved degausser or physically destroy them. For cloud-hosted storage, verify provider sanitization and key destruction policies or rely on client-managed encryption keys so you can cryptographically erase snapshots by destroying keys.

Step 3 β€” Implement procedures and select tools

Document step-by-step procedures in your media sanitization SOP and test them. For small businesses, cost-effective tools include: Linux dd for overwriting (example: sudo dd if=/dev/urandom of=/dev/sdX bs=1M status=progress conv=fsync) β€” note: dd is appropriate for HDDs but not guaranteed on SSDs; hdparm can perform ATA Secure Erase (hdparm --user-master u --security-set-pass PWD /dev/sdX; hdparm --user-master u --security-erase PWD /dev/sdX) and nvme-cli supports NVMe format (nvme format /dev/nvme0n1 with appropriate options). When using full-disk encryption from day one (recommended), implement BitLocker (Windows) or LUKS (Linux) and maintain a documented process for cryptographic erasure such as destroying escrowed keys β€” this is often the fastest, safest option for laptops. For certified disposal, consider commercial sanitization tools (Blancco, WhiteCanyon) and NAID-certified destruction services for physical media and tapes. Always test your chosen method on a non-production disk and keep screenshots, logs, and serial numbers.

Step 4 β€” Verification, logging, and chain-of-custody

Verification is essential. After sanitization, perform validation tests appropriate to the method: for overwrites, run forensic checks on a sample; for cryptographic erase, demonstrate the key was destroyed and that the device fails to mount; for physical destruction, get a Certificate of Destruction (CoD) with serial numbers. Record: who performed the sanitization, date/time, method used, device serial numbers, test results, and where disposed. Keep logs and CoDs in a retention schedule aligned with contract requirements β€” keep records for the life of the contract plus an agreed period (commonly 3–7 years) to support audits and investigations.

Step 5 β€” Third-party disposal and cloud considerations

If you use vendors for destruction or cloud providers for storage, contractually require proof of sanitization. For third-party vendors, require NAID accreditation or equivalent, ask for a CoD that lists device IDs, and include right-to-audit clauses. For cloud, require the provider to document their media sanitization processes for decommissioned hardware or use bring-your-own-key (BYOK) so you can cryptographically erase retained snapshots by revoking/destroying keys. Example: an MSP hosting backups in a public cloud can enforce encryption with keys stored in a customer-controlled HSM and then destroy keys when retention ends to meet sanitization obligations.

Practical tips, best practices, and risks of non-compliance

Best practices: bake sanitization into your procurement lifecycle (deploy FDE on day one), maintain a standardized SOP and training for staff, automate inventory tagging with asset management, and do periodic spot checks and tabletop exercises. For small businesses, a pragmatic strategy is β€œencrypt by default + cryptographic erase + physical destruction for high-risk media.” The risks of not implementing proper sanitization are severe: accidental FCI leakage leading to breach notifications, contract loss, exclusion from future federal procurements, regulatory fines, and reputational damage. Real-world scenario β€” a small engineering firm reused old laptops without full sanitization and exposed design documents that required breach response, resulting in contract termination and remediation costs far greater than proper sanitization would have cost.

In summary, meeting FAR 52.204-21 and CMMC 2.0 MP.L1-B.1.VII requires a mix of policy, inventory, correct technical methods (aligned to media type), vendor controls, and retained evidence. For small businesses the most cost-effective approach is consistent full-disk encryption at deployment, documented cryptographic erase or ATA/NVMe secure erase at disposal, use of accredited destruction vendors for physical media, and robust logging and certificates to prove the sanitization was performed.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes