🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step: How to Sanitize or Destroy Information System Media to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step-by-step guidance for small businesses to sanitize or destroy media in order to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

March 27, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step approach for small businesses to sanitize or destroy information system media to meet the requirements of FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII, including concrete tools, commands, vendor controls, and documentation you can implement right away.

Overview: what the requirement means and key objectives

Under FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems) and CMMC 2.0 Level 1 (MP.L1-B.1.V.II mapping to media protection), organizations must ensure that media containing Federal Contract Information (FCI) or controlled technical information is properly sanitized or destroyed before disposal, release, or reuse. The key objectives are (1) prevent data recovery, (2) maintain a chain of custody for disposed media, and (3) document the action for audit and contractual evidence. For the Compliance Framework practice, this means defining policies, inventorying media, selecting approved sanitization or destruction methods, executing those methods, and retaining proof (logs, certificates, photos) aligned to MP.L1-B.1.VII expectations.

Step-by-step implementation

1) Assess and inventory media

Start by compiling a media inventory tied to your Configuration Management or Asset Management system: laptops, desktops, removable drives (USB), HDD/SSD from servers or NAS, mobile devices, optical media, backup tapes, and paper. Tag each item with owner, data classification (FCI / non-FCI), location, and end-of-life (EOL) action. For small businesses, a simple spreadsheet or a ticketing system field set (asset tag, serial, media type, disposition reason) is adequate to meet the Compliance Framework practice if maintained consistently.

2) Choose the right method by media type

Follow NIST SP 800-88 Rev. 1 principles: Clear (logical data removal), Purge (makes recovery infeasible using state‑of‑the‑art lab techniques), or Destroy (physical destruction). Examples by media type: HDDs — Purge via ATA Secure Erase or multiple overwrites (shred/dd) or Destroy via shredding; SSDs — prefer vendor Secure Erase, NVMe format with secure erase, or cryptographic erasure; Self‑Encrypting Drives (SEDs) — crypto‑erase by deleting keys; mobile devices — factory reset combined with device encryption and MDM remote-wipe; paper — crosscut shredding (6mm/2x12mm recommended) or incineration. Cloud volumes — use provider’s secure-delete APIs and destroy associated snapshots; if you use customer-managed keys, delete the encryption keys to crypto-erase volumes.

3) Execution examples and technical commands (practical)

Small-business examples you can run today (exercise care — these commands are destructive): For spinning drives on Linux: check device /dev/sdX, then shred -n 3 -v /dev/sdX or dd if=/dev/urandom of=/dev/sdX bs=1M status=progress; for ATA Secure Erase: use hdparm to set a temporary password and run --security-erase (e.g., hdparm --user-master u --security-set-pass p /dev/sdX && hdparm --user-master u --security-erase p /dev/sdX). For NVMe/modern SSDs: use nvme-cli's format with secure erase (nvme format --ses=1 /dev/nvme0n1) or use the vendor tool (Samsung Magician, Intel SST). For SEDs and BitLocker/LUKS-protected drives: perform a crypto-erase by securely deleting the key material from the key management system or the device (e.g., LUKS: remove all keyslots or destroy the LUKS header; for BitLocker, securely delete the key from your key escrow). For mobile devices, ensure full-disk encryption is enabled before teardown; then issue remote wipe from your MDM and perform a factory reset; if a physical repair is needed, sanitize the device first or use a loaner. For cloud blocks, follow provider guidance (AWS: use EBS delete snapshots + delete CMK; Azure: "Delete" and purge keys in Key Vault; GCP: destroy CMEK keys). Always verify success — try mounting the device or running a forensic tool (or obtain a third-party attestation) to confirm no readable data remains.

4) Documentation, chain of custody, and third-party disposal

Record every sanitization or destruction event: asset tag, serial, method used (e.g., ATA Secure Erase, nvme format, shredder model), operator name, date/time, verification steps, and supporting evidence (screenshots of commands, shredder invoices, Certificate of Destruction). When using third-party recyclers or shredders, require NAID, R2 or e-Stewards certification and a Certificate of Destruction (CoD) that includes media identifiers and process applied. Maintain these records for the period required by contract or policy; for FAR compliance, keep them in your contract compliance repository and link to the asset record. For leased equipment, ensure return processes (sanitized before return) are embedded in asset-offboarding checklists so you don't return FCI to lessors unintentionally.

Compliance tips, best practices, and risks of non-compliance

Best practices: implement full-disk encryption by default (BitLocker, LUKS, FileVault) so retirement becomes “crypto-erase” by destroying keys; standardize on vendor tools for SSDs and SEDs to avoid ineffective overwrites; train staff on sanitization steps and include sanitization in employee offboarding and RFP/contract clauses for suppliers. Create a simple Media Sanitization Policy (part of your Compliance Framework practice) that maps media types to approved methods and required evidence. Risks of not implementing the requirement include accidental disclosure of FCI leading to contract penalties, loss of future government contracts, reputational damage, and potential forensic exposure in breach investigations. Even small businesses can trigger expensive incident response and contract termination if media containing FCI is recovered from disposed assets.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII is achievable for small businesses by inventorying media, selecting NIST‑aligned sanitization methods by media type, applying technical tools (secure-erase, vendor utilities, shredding), maintaining documented verification and chain-of-custody records, and using certified disposal vendors when necessary; combined with default disk encryption and clear policies, these steps provide a practical path to compliance and reduce the risk of data exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes