🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize Hard Drives and Removable Media to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: Tools, Verification, and Recordkeeping

Step‑by‑step guidance to sanitize hard drives and removable media to satisfy FAR 52.204‑21 and CMMC 2.0 Level 1 (MP.L1‑B.1.VII), including recommended tools, verification techniques, and recordkeeping practices.

April 03, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing hard drives and removable media is a mandatory, practical control for contractors subject to FAR 52.204‑21 and CMMC 2.0 Level 1 (MP.L1‑B.1.VII): it prevents unauthorized disclosure of mission data and controlled unclassified information (CUI) when media are retired, repurposed, or transferred.

Why sanitization matters and the risks of omission

Within your Compliance Framework, sanitization is a last-mile technical control that closes the gap between logical access controls and physical disposal. If you skip proper sanitization you risk exposing CUI from decommissioned laptops, SSDs, USB sticks, or backup media — leading to contract termination, regulatory fines, incident response costs, and reputational damage. Attackers and forensic tools can recover data from improperly wiped drives; SSDs have unique failure modes (wear leveling, overprovisioning) that make naïve methods unreliable.

Implementation steps for a small business (Compliance Framework practical guidance)

Start by updating your Compliance Framework's asset and media protection practice: maintain an up‑to‑date inventory of storage devices (asset tag, serial, device type), classify whether media ever contained CUI, and map retention/transfer workflows. Create a sanitization procedure that lists approved methods per media type, assigns roles (owner, operator, verifier), and defines when sanitization is required (decommission, repair, resale, disposal). Train staff to follow the procedure and use a simple form or ticket system to track each sanitization event.

Sanitization methods and recommended tools (technical details)

Choose the method by media type and whether reuse is intended: for magnetic HDDs, overwriting (single pass of zeros or a randomized pattern) using verified tools (e.g., Linux shred -v -n 1 /dev/sdX or dd if=/dev/urandom of=/dev/sdX bs=1M) is acceptable for CUI under NIST SP 800‑88 guidance; DBAN can be used for whole-disk HDD sanitization but is outdated and not suitable for SSDs. For SSDs and NVMe drives, prefer vendor ATA Secure Erase or NVMe Format operations, or use full-disk encryption (FDE) followed by crypto-erase: encrypt with BitLocker (Windows) or LUKS (Linux) and then destroy the encryption key (manage-bde -protectors -get C: and then use manage-bde -forcerecoveryor crypto-erase procedures), or use manufacturer tools (Samsung Magician, Intel SSD Toolbox) that implement secure erase for flash. Avoid relying on multiple-pass overwrites on SSDs — due to wear leveling they may not reach all physical cells. For removable flash (thumb drives, SD cards), low-level format or secure vendor utilities are preferred; if media contained CUI and will not be reused, physical destruction (shredding or disintegration to small pieces) is the most defensible option.

Verification techniques and forensic checks

Verification is a core requirement of MP.L1‑B.1.VII: do not mark a device sanitized until verification is recorded. For overwrites, perform a read-back verification (e.g., dd if=/dev/sdX of=/tmp/verify.img bs=1M; hexdump or sha256sum of the file) and match patterns. For Secure Erase and NVMe Format commands, capture the command output and device SMART data showing the erase. Use lightweight forensic checks to confirm no readable artifacts remain: run strings on the device image (strings /dev/sdX | grep -i 'keyword') or open-source tools like Autopsy or bulk_extractor to look for recoverable identifiers. For crypto-erase, record the key destruction event (timestamp, key ID, tool used). If using a 3rd-party destruction vendor, obtain a Certificate of Destruction with serial numbers, date, method, and signatures.

Recordkeeping: what to capture in your Compliance Framework

Create and retain a sanitization log entry for every sanitized device: asset tag, serial number, owner, media type, reason for sanitization, method used (e.g., ATA Secure Erase, vendor tool, physical destruction), operator name, verifier name, date/time, verification evidence (command output, forensic report, photo), and disposition (reused, recycled, destroyed). Store logs in a secure, auditable location (ticketing system, GPO-controlled SharePoint, or an encrypted database). For disposals under FAR/CMMC, keep records for the contractually required retention period or your organization’s evidence retention policy — typically 3–7 years unless otherwise specified by the contract.

Small business scenarios and real-world examples

Example 1: Decommissioning a laptop with an SSD that contained CUI — a small contractor should first ensure full-disk encryption (if not already encrypted, encrypt in situ if possible), then perform an ATA Secure Erase using hdparm (Linux) or the vendor utility; capture output and run a quick forensic scan. If the SSD is end-of-life, send it to a certified destruction vendor and obtain a certificate. Example 2: Reusing USB drives across teams — implement a rule that any USB which ever held CUI must be either sanitized using a vendor secure-erase tool or destroyed; maintain a simple log entry in the asset register and require pre-authorization for reuse. In both cases, the Compliance Framework must show policy, action, and verification evidence to pass audits.

Compliance tips and best practices

Align your procedures with NIST SP 800‑88 Rev. 1 guidance rather than obsolete DoD-era checklists; document why each method is chosen. Prefer encryption in day-to-day use so that crypto-erase becomes a fast, low-risk disposal method. Schedule periodic media inventories and random sanitization audits to validate process adherence. When outsourcing destruction, vet vendors for secure chain-of-custody, NDA, and proof of destruction. Finally, automate where possible: use imaging/wiping workflows in your asset management system to attach verification artifacts automatically.

Sanitizing media to meet FAR 52.204‑21 and CMMC 2.0 Level 1 MP.L1‑B.1.VII is a mix of technical choices, disciplined process, and documented verification: implement a clear policy in your Compliance Framework, use the right tools for HDDs vs SSDs, verify with forensic checks, and keep auditable records — doing so reduces risk, improves audit readiness, and protects your business and its contracts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes