🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize and Destroy Media Containing Federal Contract Information Before Disposal — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII (Step-by-Step Implementation)

Practical, step-by-step guidance to sanitize and destroy media containing Federal Contract Information to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

March 31, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains exactly how a small business can sanitize and destroy media containing Federal Contract Information (FCI) to comply with FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII — with step-by-step procedures, recommended tools, verification and documentation practices, and real-world examples you can implement today.

Why proper sanitization and destruction matters

FAR 52.204-21 requires contractors to protect Federal Contract Information and to ensure FCI is not exposed when media are retired, transferred, or disposed. Failure to sanitize or destroy media properly can lead to data breaches, loss of contracts, damages to reputation, and potential civil or contractual penalties; even a single un-sanitized laptop or USB stick can leak sensitive contract details. From a Compliance Framework perspective, this control reduces the risk of unauthorized disclosure by ensuring no residual data remains on media at end-of-life.

Step-by-step implementation (Compliance Framework practical steps)

Step 1 — Inventory, classify, and chain-of-custody

Start by compiling an inventory of all media types that might contain FCI: desktops, laptops, servers, removable drives (USB, SD), optical media, mobile devices, external HDDs/SSDs, backup tapes, and printed paper. Tag items with unique IDs and record owner, location, last use, and FCI risk level. For small businesses, a simple spreadsheet or CMDB is acceptable if it captures the required fields. Create a chain-of-custody form to accompany media from decommission to destruction, noting dates, personnel, and actions taken.

Step 2 — Choose the right sanitization method for each media type

Select methods aligned to NIST SP 800-88 Rev. 1 guidance and your Compliance Framework practice: "Clear" (logical overwrite or crypto-erase) for media that will remain in the organization, "Purge" (cryptographic erasure, block erase, or degauss) for media leaving the environment, and "Destroy" (physical destruction) for high-risk or non-reusable media. Match method to media type: HDDs typically support overwriting or degaussing; SSDs require ATA/NVMe secure-erase or cryptographic erase (do not rely on single pass zeroing); tapes often use degaussing or shredding; paper requires cross-cut shredding or pulping.

Step 3 — Execute sanitization using proven tools and vendor services

For internal execution, use vendor or OS-provided secure-erase tools and follow manufacturer guidance. Examples: use BitLocker (Windows) or FileVault (macOS) for full-disk encryption in live use and then perform a crypto-erase by deleting the keys (manage-bde -protectors -delete on Windows) before disposal; for Linux, use cryptsetup to destroy LUKS keyslots (cryptsetup luksKillSlot) then overwrite headers. For HDDs use hdparm ATA secure-erase (hdparm --user-master u --security-erase NULL /dev/sdX) or vendor utility; for NVMe and modern SSDs prefer nvme-cli secure erase (nvme format/secure-erase) or manufacturer secure-erase utilities — trimming or simple zeroing is insufficient for most SSDs. For high volumes or when you need third-party assurances, use NAID/R2-certified destruction vendors who provide destruction certificates and audit trails. For paper, use cross-cut shredders rated to P-4/P-5 or higher, or contract shredding and obtain certificates of destruction.

Step 4 — Verify sanitization and maintain documentation

Verification is essential for Compliance Framework audits: record the method used, technician name, device serial number, date/time, and the verification result. For overwrites and secure-erase operations, run sampling checks by attempting to mount the media and by using file-recovery tools on sample devices. For cryptographic erase, verify that keys are irretrievable and that the drive no longer contains a valid header. Preserve certificates of destruction from vendors and store all records centrally for the contract retention period. Use photographic evidence and signed chain-of-custody logs for high-risk disposals.

Small-business real-world scenarios

Scenario A — Replacing five laptops: A small subcontractor rotates five laptops out of service. Implementation: confirm each device stores FCI, enable BitLocker before initial use; at decommission, perform BitLocker key revocation (crypto-erase), run vendor secure-erase if hardware supports it, log device serials and actions, and either redeploy internally (after verification) or send to an R2/NAID vendor for physical shredding if resale risk exists. Scenario B — Removing backup tapes: For a handful of backup cartridges, record tape IDs, degauss using an industrial degausser rated for the tape format, then shred or incinerate; collect vendor certificates. These small steps require little overhead but meet the intent of FAR and CMMC rules.

Compliance tips and best practices

Best practices: (1) Use full-disk encryption from day one to make crypto-erase the default fast option at retirement; (2) document a media sanitization policy with roles and approved methods mapped to media types; (3) maintain a list of approved destruction vendors and verify their certifications (NAID/R2); (4) treat consumer-grade "factory reset" as insufficient for FCI; (5) sample-test every batch of sanitized media regularly and keep results; and (6) train staff on chain-of-custody and signs of tampering. Keep retention schedules that tie back to contract requirements and maintain evidence to show auditors you met MP.L1-B.1.VII.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII for media sanitization is a practical, repeatable process: inventory and classify media, select the appropriate sanitize/destroy method, execute with verified technical controls (and/or certified vendors), and document everything. For small businesses, leveraging full-disk encryption, vendor secure-erase tools, and certified destruction providers delivers a low-cost, high-assurance path to compliance while minimizing residual risk of FCI exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes