🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Checklist: Sanitizing or Destroying Reusable Media Before Disposal for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step-by-step guidance for sanitizing or destroying reusable media to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements, with small-business examples and verification best practices.

•
March 28, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step checklist for sanitizing or destroying reusable media prior to disposal to meet Compliance Framework obligations under FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII. It includes concrete actions, media-specific methods, verification and recordkeeping guidance, and small-business scenarios so you can implement controls that are defensible in audit and reduce data-leak risk.

Why sanitizing/destroying reusable media matters for Compliance Framework

FAR 52.204-21 requires contractors to safeguard covered contractor information system data and CMMC Level 1 MP.L1-B.1.V.II/MP.L1-B.1.VII requires sanitization or destruction of reusable media before disposal. Failure to properly sanitize media (hard drives, SSDs, USB sticks, backup tapes, etc.) can lead to unauthorized disclosure of federal contractor information, contract penalties, loss of future contract eligibility, regulatory action, and reputational damage—risks that small businesses cannot afford.

Step-by-step checklist (high level)

Follow these steps as a minimum checklist: 1) Inventory and classify all media that may contain covered information; 2) Determine media type and sensitivity; 3) Choose an approved sanitization or destruction method appropriate to the media and data sensitivity; 4) Execute the sanitization/destruction using validated tools or a vetted vendor; 5) Verify the result through sampling or forensic checks; 6) Document actions, preserve chain-of-custody, and obtain certificates of destruction for third-party disposals; 7) Update asset inventory and retention logs.

Media-specific methods and technical details

Apply methods mapped to media type and NIST SP 800-88 Rev.1 guidance: For magnetic HDDs — use software overwrites (single or multi-pass if required by policy) or degaussing followed by physical destruction if devices are to be destroyed. Commands commonly used: shred -v -n 1 /dev/sdX or dd if=/dev/zero of=/dev/sdX bs=1M status=progress (note: these are destructive and should be targeted to the correct device). For ATA drives, consider hdparm secure-erase (hdparm --user-master u --security-set-pass p /dev/sdX; hdparm --security-erase p /dev/sdX). For SSDs and flash-based media — prefer vendor-supplied secure-erase or cryptographic erase (crypto-erase) because wear-leveling can prevent reliable overwrites; for NVMe, use the nvme-cli format/sanitize functions or blkdiscard where supported. Optical media can be shredded or physically broken; tapes often require degaussing then shredding. For encrypted drives where keys are securely managed, crypto-erase (zeroing the key) can be a fast, verifiable option. Do not rely on quick formats, deletions, or factory resets alone.

Verification, logs, and proof of destruction

Verification is essential for compliance. For internal sanitization, perform sampling verification with a forensic tool or hex viewer to check for residual data. Maintain a media destruction log that includes: asset tag/serial, media type, data classification, method used (tool/version/parameters), date/time, person/operator, verification steps/results, witness signatures (if applicable), and disposition (recycled, landfilled, donor, etc.). If you use a third-party disposal vendor, obtain a Certificate of Destruction (CoD) and the vendor's chain-of-custody documentation; retain these records per contract requirements—commonly 3–7 years for contractor records.

Implementation notes specific to Compliance Framework

Integrate this checklist into policies and procedures required by the Compliance Framework: add a Media Sanitization Procedure mentioning NIST SP 800-88 as the baseline, map MP.L1-B.1.VII controls in your System Security Plan (SSP), and assign roles for Media Owner, IT Operator, and Compliance Reviewer. Train staff on labeling/tagging media, secure transport, and approved tools. Schedule periodic validation (quarterly or at least annually) and include media handling in employee offboarding checklists (laptops returned, drives wiped/destructed). For cloud-stored contractor information, include contract clauses requiring cloud providers to sanitize storage prior to return or deletion.

Small-business examples and scenarios

Example 1 — IT refresh: A 12-person defense subcontractor retires 8 laptops. Inventory each device, determine which contain covered information, choose crypto-erase for devices encrypted at-rest, run vendor secure-erase for SSDs, verify by sampling, document, and obtain CoD for devices sent for shredding. Example 2 — Employee departure: An employee returns a USB drive used for CUI—immediately isolate the device, perform an approved secure-erase, log the action, and record the date and operator. Example 3 — Resale of refurbished hardware: If you plan to resell, wipe to factory or better following NIST guidelines and retain verification logs to demonstrate compliance to future auditors.

Compliance tips and best practices

Keep it simple and defensible: adopt NIST SP 800-88 Rev.1 as your standard, maintain an asset-tagged inventory, and require Certificates of Destruction from vendors. Use full-disk encryption on all devices from day one—crypto-erase is often the fastest and verifiable path to sanitization. Automate logging where possible (tools that output logs with timestamps and checksums). Test your procedures on a sacrificial device to validate that the chosen method removes recoverable data. Include media sanitization in your incident response playbook: if media is suspected to be compromised, quarantine and perform stronger sanitization or destruction.

The risk of not implementing these steps includes accidental disclosure of sensitive contractor information, failed audits, contract penalties, and loss of business. For small businesses especially, a single lost hard drive can trigger a breach notification, remedial costs, and damage to customer trust—outcomes that proper media sanitization policies can prevent.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requires an auditable, media-aware process: inventory and classify media, select media-appropriate sanitization/destruction methods (prefer vendor secure-erase or crypto-erase for flash), verify results, document thoroughly, and retain proof. Implement these steps, train your team, and vendor-manage disposal to ensure your small business stays compliant and minimizes data-leak risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes