🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize Devices for Off‑Site Maintenance: NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.3 Implementation Checklist

Step-by-step implementation checklist to sanitize devices prior to off-site maintenance to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.3 requirements, with practical tools, commands, and small-business scenarios.

April 18, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sending devices off-site for repair or maintenance creates a high-risk window for exposure of Controlled Unclassified Information (CUI) or other sensitive organizational data; MA.L2-3.7.3 requires that organizations sanitize or otherwise protect system components before they go off-site, and this post gives a practical, compliance-focused checklist, technical options, and small-business examples to implement that control reliably.

What MA.L2-3.7.3 requires (practical interpretation)

At a practice level under the Compliance Framework, MA.L2-3.7.3 expects organizations to ensure that electronic devices and storage media are sanitized, encrypted with key management controls, or otherwise rendered free of sensitive data prior to off-site maintenance. Key objectives are: prevent unauthorized disclosure, maintain chain-of-custody and evidence of sanitization, and use sanitization techniques appropriate to the device/media type and data classification. Implementations must map to documented policy, vendor contracts, and be verifiable.

Sanitization methods and technical details

Choose the sanitization method based on media type and sensitivity. For magnetic HDDs, secure overwrite (single or multiple passes) or degaussing is acceptable. For SSDs and NVMe devices, use vendor-specified secure-erase or cryptographic-erase techniques—traditional multi-pass overwrites (like DBAN) are not reliable on many SSDs. When full-disk encryption (FDE) is in use, cryptographic erase (destroying or revoking keys) is an acceptable and fast method if you can demonstrate the encryption is robust and key material is irrecoverable. Practical commands and tools (examples):

Use vendor utilities or well-known tools—examples below (run as administrator/root, and always confirm target device names before executing):

# ATA HDD/SSD (Secure Erase)
hdparm --user-master u --security-set-pass p /dev/sdX
hdparm --security-erase p /dev/sdX

# NVMe secure format / sanitize (if supported)
nvme format /dev/nvme0n1 -s 1
nvme sanitize /dev/nvme0n1 --action crypto-erase

# LUKS (Linux) cryptographic key removal
cryptsetup luksKillSlot /dev/sdX 0

# Windows (full-disk wipe): DiskPart zero-fill
diskpart
  select disk 1
  clean all

Notes: prefer vendor secure-erase utilities for SSDs; do not rely on DBAN for SSDs; keep firmware and utilities up to date; and treat cryptographic-erase as valid only if you can demonstrate key destruction (e.g., key deletion from KMS/TPM and no escrowed copies).

Implementation checklist for off-site maintenance

Use this step-by-step checklist as your operational procedure for MA.L2-3.7.3 compliance. Put it in your SOPs and train staff:

  • Identify device and data classification: Tag devices holding CUI or sensitive data. If device contains only non-sensitive data, note that in the record.
  • Backup and isolate: Take an approved backup if data must be preserved; encrypt backups and store them on-premises or on approved cloud storage before shipping.
  • Select sanitization method: Based on media type and classification choose physical destruction, vendor secure-erase, cryptographic erase (with proof of key destruction), or overwrite (where appropriate).
  • Remove or replace storage: For small devices (laptops, desktops), consider removing the drive and sending only the component that needs repair, or replacing the drive with a sanitized spare before shipping.
  • Perform sanitization and verification: Execute the chosen method and run a verification procedure (forensic check, tool-report, or hash comparison) that confirms media is sanitized.
  • Document and retain evidence: Capture device serials, method used, command output or tool report, time/date, operator, and a signed Certificate of Sanitization before release.
  • Contractual controls: Ensure vendor agreements include sanitization evidence, return/destroy clauses, and nondisclosure plus personnel vetting obligations.
  • Chain-of-custody: Use a shipping form signed by sender and courier and require chain-of-custody receipts from the vendor on receipt and return.

Verification, documentation, and vendor management

Verification is critical for compliance audits. Keep tamper-evident logs and artifacts: tool output files (timestamped), screenshots, vendor Certificates of Erasure (COE) including serial numbers and method, and a scanned chain-of-custody form. For cryptographic erase, retain KMS logs showing key destruction and delete confirmation. If a third-party performs sanitization, require their COE and run a spot forensic verification on returned components (e.g., boot a forensic environment and inspect for residual files or unallocated data using tools such as Autopsy or FTK Imager).

Small-business real-world scenarios

Scenario A — Laptop to a local repair shop: A small government contractor has a laptop with CUI that needs a new display. Options: remove and retain the SSD and ship only the laptop chassis, or if shipping the whole laptop is unavoidable, encrypt the drive with full-disk encryption and remove/destroy the keys so the repair shop cannot access data. Alternatively, perform a secure erase of the drive before shipping and reinstall a sanitized OS if the data is not required to be preserved. Record the serials, sanitization method, and obtain the repair shop’s receipt and COE for any replaced parts.

Scenario B — Server/storage out for component repair: For servers with RAID arrays, identify the affected drives and remove them or replace them with sanitized hot spares before shipment. For RMA replacements where vendor needs the entire unit, perform vendor-approved secure-erase (vendor tool or hardware crypto-erase), produce a signed COE, and maintain chain-of-custody. If devices contain highly sensitive data that cannot be recreated, consider on-site repair or vendor on-site service under NDA rather than off-site transport.

Risk of not implementing MA.L2-3.7.3 and best practices

Failing to sanitize devices before off-site maintenance can lead to data exposure, loss of contracts, regulatory fines, reputational damage, and potential compromise of other systems if malware or credentials are present on returned equipment. Best practices: default to “remove storage” for small businesses, enforce FDE with rigorous key management (and avoid sharing keys), require COEs and vendor SLAs with penalties for noncompliance, and maintain an auditable record retention policy for sanitization evidence. Train helpdesk and shipping staff—human error (shipping the wrong device or forgetting to sanitize) is a common cause of breaches.

Summary: Implement MA.L2-3.7.3 by building a documented SOP that maps device types to approved sanitization methods, enforces removal or replacement of storage where feasible, requires verifiable evidence (COEs, logs, KMS entries), and embeds vendor contract and chain-of-custody controls; for small businesses, practical choices (remove drives, use crypto-erase, or require on-site vendor repairs) balance security, cost, and operational needs while meeting the Compliance Framework objectives.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes