🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Build a Media Sanitization Policy That Meets FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: Templates and Procedures

Step-by-step guidance and ready-to-use templates to create a media sanitization policy that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

β€’
April 16, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Creating a defensible media sanitization policy is a practical, high-value control that small businesses can implement to meet FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) requirements β€” this guide gives you the templates, procedures, and technical details you need to implement, document, and evidence compliance under the "Compliance Framework".

Why a Media Sanitization Policy Matters for Compliance Framework

FAR 52.204-21 and CMMC Level 1 require basic safeguarding of covered contractor information and controlled unclassified information (CUI). A media sanitization policy documents how your organization removes data from electronic and physical media before reuse, transfer, or disposal β€” mapping directly to the Compliance Framework practice of "Templates and Procedures" for media protection. Without a written, repeatable process and evidence of sanitization, auditors can’t verify that CUI was protected when devices left your control.

Core components your policy must contain

A minimal, audit-ready policy for Compliance Framework should include: scope (types of media and systems covered), roles and responsibilities (asset owner, IT operator, facility manager, records custodian), procedures mapped to sanitization methods (clear, purge, destroy per NIST SP 800-88 Rev. 1), documentation and logging requirements, verification and acceptance testing, vendor requirements for off-site disposal, legal hold and retention exceptions, and a schedule for policy review and training. Provide explicit templates for the Media Sanitization Procedure, Media Sanitization Log, Chain-of-Custody form, and Certificate of Destruction.

Practical procedures β€” exact steps a small business can follow

Implement a simple workflow: 1) Identify and tag end-of-life media via your asset inventory/CMDB; 2) Classify whether media contains CUI; 3) Select sanitization method from approved list (see next section); 4) Execute sanitization using documented tool/command; 5) Verify and capture evidence (logs, screenshots, serial numbers); 6) Update asset record and retain the Media Sanitization Log for the contractually required period. Use signed authorization forms for off-site transport and require Certificates of Destruction from vendors. Assign a Control Owner responsible for periodic checks and audit support.

Technical methods and examples (what to use and when)

Follow NIST SP 800-88 Rev. 1: "Clear" (overwrite or use built-in sanitization), "Purge" (degauss for magnetic, firmware secure-erase, cryptographic erase), and "Destroy" (shred, incinerate). For traditional HDDs: a single full overwrite is acceptable; common tools include dd if=/dev/zero of=/dev/sdX bs=1M or use "diskpart clean all" on Windows. For SSDs and NVMe, prefer vendor secure-erase, NVMe format secure-erase, or cryptographic erase because overwriting can be ineffective β€” example vendor commands include Samsung/Micron secure erase utilities or "nvme format /dev/nvme0n1 -s 1" (test in lab first and consult vendor docs). For whole-disk encryption deployments, plan for cryptographic erasure: delete the key and document the action β€” an effective and fast purge for encrypted devices. Mobile devices: factory reset plus verified cryptographic erase or physical destruction for highly sensitive data. Do not use degaussing on SSDs (it’s ineffective).

Command examples and vendor notes (use with caution)

Examples for small IT teams: Linux HDD overwrite: sudo dd if=/dev/zero of=/dev/sdX bs=1M status=progress && sync; Linux secure-erase for ATA: sudo hdparm --user-master u --security-set-pass pass /dev/sdX && sudo hdparm --user-master u --security-erase pass /dev/sdX. Windows full-disk zero: diskpart -> select disk X -> clean all. NVMe secure erase: use vendor tools or nvme-cli: sudo nvme format /dev/nvme0n1 -s 1 (confirm flags and test per vendor). Emphasize: test tools in a controlled environment and capture logs β€” incorrect use can brick devices and you must retain evidence that the correct method was applied for audit.

Real-world small business scenarios

Scenario A: A 20-person defense subcontractor retiring 5 laptops β€” procedure: verify each laptop serial in the asset register, confirm CUI presence, perform full-disk encryption key deletion (if encrypted) or execute secure-erase and capture hdparm output and screenshots, log serial numbers and operator name, and retain the Media Sanitization Log in your compliance repository. Scenario B: Replacing a server with RAID arrays β€” engage an approved destruction vendor, generate an off-site transfer form and chain-of-custody, receive a Certificate of Destruction (CoD) with lot numbers and witness signatures, and upload the CoD to your evidence store. These small-business workflows are low-cost but must be consistently executed to pass FAR/CMMC evidence reviews.

Compliance tips and best practices

1) Default to whole-disk encryption at deployment β€” it simplifies sanitization later (cryptographic erasure). 2) Keep a centralized Media Sanitization Log (CSV or GRC tool) keyed to asset tags and contract IDs. 3) Require vendor CoDs and include the right to audit in vendor contracts. 4) Train non-IT staff who handle media (facilities, procurement) and run quarterly spot-checks. 5) Align retention of sanitization evidence to the Compliance Framework and contract requirements (retain logs for the duration specified in contract/FAR). 6) Include a legal-hold exception process so you don’t accidentally destroy evidence during an investigation.

Risks of not implementing a proper policy

Failing to implement or document media sanitization exposes you to data leakage (loss of CUI), breach notification obligations, contract non-compliance and potential contract termination, loss of future bid opportunities, and reputational damage. Technically, residual data on inadequately sanitized media can be recovered with low cost and used to reconstruct sensitive information β€” and for small businesses that depend on government contracts, a single failure can trigger a security finding under FAR 52.204-21 or a CMMC assessment deficiency.

Summary: Build a concise Media Sanitization Policy with clear roles, an approved list of sanitization methods mapped to NIST SP 800-88, step-by-step procedures, evidence templates (Media Sanitization Log, Chain-of-Custody, Certificate of Destruction), vendor requirements, and a schedule for training and review; use whole-disk encryption and vendor secure-erase tools where possible, retain auditable records, and run periodic tests so your small business can demonstrate compliance with the Compliance Framework, FAR 52.204-21, and CMMC 2.0 Level 1 MP.L1-B.1.VII.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes