🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide to Sanitizing vs Destroying Storage Devices for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII Compliance

Clear, practical steps for small businesses to sanitize or destroy storage devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements while minimizing risk and documenting compliance.

•
March 26, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide explains, step by step, how to decide between sanitizing and destroying storage devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements, with practical implementation details, verification practices, and small-business examples to help you build auditable processes that reduce risk.

Understand the requirement and the risk

FAR 52.204-21 requires contractors to implement basic safeguarding of covered contractor information systems; CMMC 2.0 Level 1 media protections such as MP.L1-B.1.V.II/VII emphasize safeguarding and controlled disposition of media containing Federal contract information or CUI. The goal for both is to ensure that sensitive data cannot be recovered from storage devices before reuse, transfer, or disposal. Failing to properly sanitize or destroy media risks data exposure, breach reporting obligations, loss of contracts, civil penalties, and reputational harm.

Step 1 — Inventory, classify, and apply risk-based decision rules

Start by inventorying all storage devices (HDDs, SSDs, NVMe, removable media, backup tapes, USB drives, mobile devices) and classifying them by data sensitivity and end-of-life disposition (reuse, transfer to subcontractor, recycle, destroy). Create a simple decision matrix: if the device contains CUI or prolonged retention of Federal contract information, prefer purge or destroy; for non-sensitive public data, clearing may suffice. Include device identifiers (asset tag, serial, model), user assignment, storage type, and last-known contents in the inventory record.

Implementation note (Compliance Framework)

Map the inventory to the Compliance Framework fields (asset owner, classification, disposition reason, control MP.L1-B.1.VII) so you can report status during assessment. Keep the inventory in a version-controlled spreadsheet or an asset-management tool and export proof for audits.

Step 2 — Choose the correct method: Clear, Purge, or Destroy

Follow NIST SP 800-88 Rev.1 guidance: "Clear" (logical deletion overwrites or crypto-erase for reuse within same environment), "Purge" (more robust: crypto-erase, block erase, or secure sanitize commands for devices leaving the environment), and "Destroy" (physical destruction to render media unrecoverable). Choose based on device type: HDDs can often be sanitized with multi-pass overwrite or ATA Secure Erase; SSDs require vendor/firmware-based sanitize commands or cryptographic erasure because overwrite may not reliably remove data due to wear-leveling; tapes and optical media typically need physical destruction or degaussing/secure erase methods appropriate to media technology.

Specific technical details and tools

Examples of technical approaches: for ATA drives, use vendor ATA Secure Erase (hdparm on Linux) or manufacture-provided tools; for NVMe, use nvme-cli sanitize or format-ns commands; for SSDs without a reliable sanitize command, rely on full-disk encryption from deployment (crypto-erase by deleting the encryption key) or physical destruction. Open-source tools like nwipe or shred can be used for HDD clearing in small shops, but verify tool suitability for SSDs first. For enterprise-scale, use certified sanitization solutions and maintain vendor validation documentation.

Step 3 — Implement procedure, logging, verification, and chain of custody

Create a documented procedure that lists: pre-sanitization checks (backups, data retention holds), chosen method, operator name, tool and version, command or equipment ID, date/time, and verification result. Maintain a chain-of-custody record from collection to final disposition. Verification should include both automated logs from the sanitization tool and a human review; for high-risk items, perform random forensic checks (attempt to mount the device, check for recoverable file headers) and record results. Keep records per contract retention requirements—when in doubt, retain sanitization logs for at least the contract term plus 3 years.

Small-business scenarios and examples

Scenario A — Small engineering firm retiring 10 laptops: inventory devices, back up required records, enable full-disk encryption on every laptop in production so you can later perform crypto-erase by securely deleting keys, and when retiring machines use the vendor Secure Erase or physically shred SSDs if a sanitize command is not available. Scenario B — Subcontractor returns backup tapes: require the subcontractor to provide purge/destruction certificates and a signed chain-of-custody; if receiving tapes with unknown history, degauss and then physically shred. Scenario C — USB drives found in drawers: treat as unknown media; document acquisition, either sanitize with vendor-recommended methods or physically destroy; log destruction with photos for the audit trail.

Compliance tips and best practices

Keep these practices to streamline compliance: 1) Deploy full-disk encryption by default (reduces need for physical destruction if keys are managed correctly); 2) Maintain an approved-tool whitelist and keep vendor validation or NIST-equivalent guidance; 3) Train operators on sanitization procedures and chain-of-custody; 4) Include sanitization/destruction requirements in contracts and flow them down to subcontractors; 5) Use tamper-evident evidence bags and timestamped photos for high-value disposals; 6) Run periodic tabletop exercises and spot-checks to demonstrate ongoing compliance to assessors.

Risk of not implementing proper sanitization and destruction

Failure to follow sanitization or destruction requirements can lead to data leakage (CUI exposure), mandatory breach notifications, contract sanctions, loss of Federal contracting eligibility, and reputational damage that is fatal for small businesses. Technically, residual data on improperly sanitized SSDs or reused drives has led to successful forensic recoveries—an avoidable risk when following documented procedures and using approved methods.

Summary: Build a simple, auditable workflow—inventory and classify media, choose Clear/Purge/Destroy based on device and data risk, use vendor-validated tools or physical destruction, document chain-of-custody and verification, and train staff. These practical controls map directly to FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII expectations and will help a small business demonstrate defensible, repeatable media disposition practices during assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes