🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize and Destroy Media Containing Federal Contract Information: Step-by-Step Guide for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step-by-step guidance for small businesses to sanitize and destroy media containing Federal Contract Information to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 19, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing and destroying media that contain Federal Contract Information (FCI) is a mandatory, practical step for organizations subject to FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII — and it’s often where small businesses slip up because of unclear processes, ad-hoc tools, or treating media disposal like a one-off chore instead of a repeatable control. This post gives a concise, actionable procedure you can implement today, including real-world small-business scenarios, specific techniques for different media types, verification steps, and documentation practices that align with the Compliance Framework.

Why this control matters (quick compliance and risk overview)

FAR 52.204-21 and the corresponding CMMC Level 1 practice require that you prevent unauthorized disclosure of FCI when media reaches end-of-life or is repurposed. Failure to properly sanitize or destroy media exposes you to data breaches, contract penalties or loss, and reputational damage — even if the exposed data isn’t high-impact controlled unclassified information (CUI). For small businesses, a single lost laptop or improperly wiped backup can mean a federal investigation and immediate suspension of award activities.

Step-by-step implementation guide

Below is a practical, repeatable process you can adopt as part of your Compliance Framework practice for MP.L1-B.1.VII. Treat this as a checklist and embed each step in your SOPs with responsible roles assigned (IT asset custodian, security officer, and contracting officer where applicable).

1) Inventory and classification

Create an asset register for all media types that can store FCI (laptops, desktops, USB drives, SD cards, SSDs/NVMe, HDDs, backup tapes, cloud snapshots, MFD/HDD in printers, mobile devices, optical media, and paper). Record device type, serial number, last user, owner, location, and whether FCI is present. For small businesses, even a simple spreadsheet or an entry in your compliance tool is sufficient so long as it’s updated before disposal.

2) Select the correct sanitization method

Use NIST SP 800‑88 Rev.1’s three sanctioned outcomes: Clear, Purge, Destroy — and match them to media type and threat model: - Magnetic HDDs: Purge (multiple overwrites acceptable) or Destroy (degauss + shred). - SSDs and NVMe: Prefer Purge via vendor secure-erase, NVMe format secure-erase, blkdiscard, or cryptographic erase; overwriting is unreliable on many flash devices. - Self-Encrypting Drives (SED): Crypto-erase by securely deleting keys (fast and often acceptable). - USB flash drives / SD cards: If inexpensive, physically shred; otherwise secure-erase with vendor tools or blkdiscard. - Backup tapes: Degauss (verify), then shred; if degaussing not available, physical destruction is required. - Optical media: Cross-cut shred or incinerate. - MFD/printer storage: Follow manufacturer sanitization procedures or remove and destroy disk. - Mobile devices: Full device factory reset combined with crypto-erase (if encrypted) and physical destruction for devices containing sensitive FCI.

3) Execute technical steps (examples)

Examples you can use or adapt — always verify vendor guidance first: - Linux HDD (ATA): hdparm --user-master u --security-set-pass password /dev/sdX; hdparm --security-erase password /dev/sdX - NVMe: nvme format /dev/nvme0n1 -s 1 (secure erase — vendor-specific flags vary) - SSD discard (simple): blkdiscard /dev/sdX (works if firmware supports TRIM/discard) - Windows: For enterprise, use vendor secure erase utilities (Intel/Micron/Samsung tools) or "diskpart clean all" (zeroing, slower and not guaranteed for all SSDs). - SED: Use OPAL management tools or drive vendor crypto-erase/PSID revert commands to render data inaccessible by deleting keys. - Tapes: Use a verified degausser and then physically shred; verify by re-reading media on a test drive. If you lack in-house capability, use a certified e-waste vendor for physical destruction and request a Certificate of Destruction (CoD).

4) Verify and document

Verification is critical. For logical sanitization, attempt a read/identify step (e.g., try mounting the device in a sandbox and run simple file listing). For high assurance, run a forensic verification by an independent party. Document device serial, method used, tool and version, operator, date, witness, chain-of-custody, and attach photos or CoD. Keep these records per contract or organizational policy (recommendation: retain disposal records for at least the life of the contract plus any required retention period — many small businesses use 3–7 years based on contract requirements).

Real-world small-business scenarios

Scenario A — Laptop refresh: A consultant returns a laptop at contract end. Inventory notes FCI may exist. Procedure: image the drive for retention if required (store encrypted), then perform vendor secure-erase or cryptographic key destruction if SED. If unsure about drive behavior, remove and physically destroy or use a certified disposal vendor and obtain CoD. Scenario B — USB drives in supply chain: Avoid using USB for FCI; if found, sanitize by vendor tool or physical destruction and log the event. Scenario C — Printer with hard disk: Before decommissioning, remove HDD and either sanitize per manufacturer instructions (if supported) or have the drive destroyed; log serial and CoD in asset register.

Compliance tips and best practices

Practical tips: 1) Implement whole-disk encryption on all endpoints (BitLocker, LUKS) so crypto-erase becomes an option and reduces destruction frequency; 2) Standardize vendor-approved sanitization tools in your SOP and test them on representative models periodically; 3) Use labeled asset tags and require an IT sign-off before any asset leaves custody; 4) Train staff so non-technical users don’t throw devices into general trash; 5) For cloud-hosted backups, sanitize by deleting encryption keys and confirming immutable snapshots are destroyed per your cloud provider’s documented process.

Risk of non-compliance

Not sanitizing or destroying FCI media properly puts you at risk of data exposure via resale, dumpster dives, theft, or contractor handover. Consequences include contract suspension or termination, mandatory reporting requirements, potential legal action, remediation costs, and loss of future government work. For small businesses, the financial and reputational impact from a single incident can exceed the cost of a modest, documented media destruction program.

In summary, make media sanitization and destruction a formal, auditable process mapped to your Compliance Framework and MP.L1-B.1.VII: maintain an up-to-date inventory, choose NIST-aligned methods by media type, use vendor tools or certified destruction vendors, verify and document each action, and educate staff. These steps are affordable for small businesses and dramatically reduce the risk of FCI leakage while meeting FAR 52.204-21 and CMMC 2.0 Level 1 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes