🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize Hard Drives and SSDs for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: Tools, Commands, and Verification Steps for FCI

Practical tools, commands, and verification steps to sanitize hard drives and SSDs to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements for protecting Federal Contract Information (FCI).

•
March 26, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing storage devices that have held Federal Contract Information (FCI) is an essential part of meeting FAR 52.204-21 and CMMC 2.0 Level 1 obligations (Control MP.L1-B.1.VII) — this post gives a practical, implementation-focused playbook with tools, commands, verification steps, and small-business examples so you can safely clear, purge, or destroy drives and document compliance.

Understand the objective and the approach

The compliance goal is simple: do not release recoverable FCI when media are retired, repurposed, or handed off. Practically, that means inventorying media, deciding whether to clear (logical removal), purge (render data recovery infeasible), or destroy (physical destruction), and using methods appropriate to the media type. Follow NIST SP 800-88 Rev. 1 guidance (Clear, Purge, Destroy) as the standard technical approach; for CMMC Level 1 and FAR 52.204-21, documentable, repeatable procedures and evidence of sanitization suffice for most small business requirements.

Sanitization methods mapped to media

For traditional magnetic HDDs, multi-pass overwrites or a single-pass overwrite with verification is acceptable for clearing. For SSDs and NVMe drives, overwriting is unreliable because of wear leveling and remapped blocks — use firmware-based Secure Erase (ATA Secure Erase), NVMe SANITIZE, vendor utilities, or cryptographic erasure (destroying the encryption key). For end-of-life, physical destruction (shredding/crushing) is always an acceptable option and often required if you cannot guarantee a successful purge.

Tools and commands (practical examples)

Below are concrete commands and tools you can run. Always do these on the correct device node (e.g., /dev/sdX or /dev/nvme0n1) and work from backups if the drive contains data you must keep.

HDD (Linux) — single-pass zero overwrite (clear) and hdparm secure erase (when supported):

sudo dd if=/dev/zero of=/dev/sdX bs=1M status=progress conv=fdatasync
# Or use hdparm to issue ATA Secure Erase (faster when supported)
sudo hdparm --user-master u --security-set-pass p /dev/sdX
sudo hdparm --security-erase p /dev/sdX

SSD / NVMe (Linux) — prefer firmware erase or NVMe sanitize:

# Check NVMe support
sudo nvme id-ctrl /dev/nvme0n1
# NVMe format (crypto erase if supported)
sudo nvme format /dev/nvme0n1 --ses=1
# or vendor-specific sanitize
sudo nvme sanitize /dev/nvme0n1 --action 1

Windows — diskpart clean all (HDD), vendor tools for SSDs, and cipher for wiping free space:

diskpart
list disk
select disk 2
clean all
# For SSDs, use manufacturer tools (Samsung Magician, Intel SSD Toolbox, Crucial Storage Executive), or use ATA secure erase via bootable Linux tool

Cryptographic erase — if drives are Full Disk Encrypted (FDE), cryptographic erasure (securely zeroing or deleting the key) is immediate and acceptable when proven: delete the volume key from the key management system and log the key ID, time, and operator.

Verification, logging, and evidence

Sanitization is only compliance-relevant if you can prove it. Verification steps include: checking drive security state (hdparm -I / nvme id-ctrl), reviewing command exit codes, taking console logs/screenshots of successful secure-erase operations, sampling sanitized media to attempt forensic recovery, and keeping a signed Certificate of Sanitization/Destruction that lists device model, serial number, method used, operator, date/time, and witness. Example verification commands:

sudo hdparm -I /dev/sdX | grep -i security
sudo nvme id-ctrl /dev/nvme0n1 | grep -i sanitize
# quick residual check: hexdump first MB to confirm zeroed
sudo dd if=/dev/sdX bs=1M count=1 | hexdump -C | head

For small shops: choose a sample size (e.g., 5–10% of sanitized drives each quarter) and run a recovery attempt using a basic forensic tool (photorec, scalpel, or a commercial tool) to validate that data cannot be recovered. Keep those results in your compliance repository.

Small business scenarios and real-world examples

Example 1 — Repurposing laptops internally: Issue FDE at provisioning (BitLocker or LUKS). When a laptop is retired, perform a cryptographic erase (delete key from key manager) and run a firmware Secure Erase or vendor tool as a second step. Record the serial number and the key ID in your asset register and sign the sanitization record. Example 2 — Disposal via recycler: For drives going to an external vendor, require a Certificate of Destruction and, if the drives contained FCI, insist on physical destruction (shredding) or evidence of successful NVMe sanitize with logs. Vet vendors and retain chain-of-custody paperwork.

Risks, compliance tips, and best practices

Risks of inadequate sanitization include accidental disclosure of FCI, contract violations, loss of government business, penalties, and reputational harm. Best practices: enforce FDE from day one, maintain a media inventory with tagging, document SOPs for sanitization that reference NIST SP 800-88, use vendor firmware commands for SSDs instead of overwrite, require certificates for third-party destruction, keep logs and sampling results, and train staff on safe handling and chain-of-custody. Where possible, automate logging (scripts that run commands, capture output, and append to the CMDB) to reduce human error.

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 for MP.L1-B.1.VII is achievable for small businesses: use the right sanitization method for the media type, capture verification evidence, apply full-disk encryption as a preventive control, and adopt vendor certificates or physical destruction when required. With an inventory-driven SOP, periodic sampling, and clear documentation (device serials, operator, method, logs), you can demonstrate repeatable compliance while minimizing operational friction.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes