🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to sanitize or destroy storage media to meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: NIST 800-88 methods and tool selection

Practical guidance for small businesses to sanitize or destroy storage media in compliance with FAR 52.204-21 and CMMC 2.0 Level 1 using NIST SP 800-88 methods and recommended tools.

•
April 22, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to sanitize or destroy storage media to meet FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) by following NIST SP 800-88 guidance, with practical implementation steps, tool choices, and small-business scenarios you can apply immediately.

Implementation overview for Compliance Framework

Start by incorporating a media sanitization policy into your Compliance Framework: inventory all storage media (HDDs, SSDs, USBs, mobile devices, backups, and removable media), classify the information (Federal Contract Information / FCI or other sensitive data), and map required sanitization level to NIST SP 800-88: Clear, Purge, or Destroy. For FAR 52.204-21 and CMMC Level 1 you must ensure FCI is protected when media is disposed or repurposed — practically this means: document each asset, select an appropriate sanitization method, execute the action, capture verification (logs or certificate), and retain records to demonstrate compliance during audit or contract reviews.

Selecting a sanitization level (Clear, Purge, Destroy)

NIST SP 800-88 defines three end-state categories. Clear (logical techniques such as file delete and overwriting) is acceptable for media staying in the same organization for low-risk data. Purge (more robust methods like cryptographic erase or manufacturer secure erase) is required when media leaves organizational control or for higher sensitivity. Destroy (physical methods — shredding, crushing, incineration) is required when data is extremely sensitive or media cannot be reliably sanitized (e.g., some failed SSDs). Choose based on media type and risk: HDDs can often be purged with multi-pass overwrites or degaussing, while SSDs generally require ATA Secure Erase, NVMe sanitize, or physical destruction due to wear-leveling and remapped blocks.

Tools and techniques — software and device-specific methods

Use device-aware tools rather than generic overwrites. For HDDs: manufacturer secure erase utilities or well-known tools that trigger ATA Secure Erase are reliable; for Windows drives you can use diskpart "clean all" to zero a block device (note zeroing is 'clear' for low-risk cases). For SSDs: prefer ATA Secure Erase (hdparm --security-erase on Linux) or NVMe sanitize (nvme-cli) and avoid multi-pass shred methods because SSD controllers and wear-leveling can leave data. For removable flash (USB/SD), consider full-device overwrite with blkdiscard (Linux) or a vendor tool, or cryptographic erase if the device uses hardware encryption. For Windows file-scope: SDelete (Sysinternals) can overwrite free space; however, SDelete and DBAN are not suitable for SSDs. For commercial environments and when you need certifiable evidence, use certified erasure products (e.g., Blancco) that produce audit-ready reports accepted by many primes and contracting officers.

Physical destruction and vendor-managed options

When destruction is the chosen disposition, use appropriate physical methods: degaussing is effective for traditional magnetic HDD platters but does not work on SSDs (and may not satisfy some contracts because it destroys drive electronics but not necessarily all remapped NAND). Shredding to particle sizes specified by policy (e.g., NAID recommendations) or using a certified hard-drive crusher is the recommended approach for both HDDs and SSDs. If you outsource, contract with a NAID AAA-certified vendor who provides chain-of-custody, certificate of destruction, and a unique job ID you can retain in your compliance records.

Small business step-by-step SOP and real-world scenarios

Example SOP for a small business disposing of laptops: 1) Inventory asset and confirm no business data needed; 2) Backup required data and log the backup; 3) If SSD: attempt ATA Secure Erase (hdparm) or initialize crypto-erase (if full-disk encryption used, a crypto-erase may suffice); if Secure Erase fails, arrange physical destruction; 4) If HDD: sanitize with manufacturer secure erase or overwrite if validated; 5) Run verification (tool logs, checksums, or vendor certificate) and store logs in the asset record for contract compliance; 6) Update asset inventory to "disposed" and attach certificate. Real-world scenario: a small defense subcontractor replacing 5 laptops before returning them to a lessor — follow the SOP, use ATA Secure Erase for SSDs, obtain certificates for destroyed drives, and retain those records for the contract period or audit.

Risks, compliance tips, and best practices

Risks of not properly sanitizing media include exposure of FCI, contract violations under FAR 52.204-21, loss of eligibility for future contracts, reputational harm, and regulatory penalties. Best practices: enforce full-disk encryption from procurement (so crypto-erase becomes an effective, fast option), maintain an auditable inventory and chain-of-custody, prefer vendor tools that produce verifiable logs, and train staff on device-specific methods. Verify vendor credentials (NAID, ISO), keep destruction certificates for the contractually required retention period (check your contract — 3–6 years is common but confirm), and perform periodic spot checks (e.g., attempt data recovery on sanitized drives in a controlled test environment) to validate your procedures.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 requirements for MP.L1-B.1.VII means adopting NIST SP 800-88 principles: inventory and classify media, select Clear/Purge/Destroy per media and risk, use device-appropriate tools (ATA Secure Erase, NVMe sanitize, manufacturer utilities, certified erasure software, or physical destruction), document every step with logs or certificates, and retain records to demonstrate compliance. For small businesses, practical measures like purchasing or using validated tools, encrypting devices at acquisition, and contracting with certified destruction vendors will reduce risk and simplify compliance evidence collection.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes