🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to build a step-by-step checklist to sanitize equipment before off-site maintenance for CUI compliance β€” NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.3

Step-by-step guidance to create a practical, auditable sanitization checklist for equipment sent off-site for maintenance to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.3 requirements.

β€’
April 07, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design and implement a step-by-step sanitization checklist your small business can use to sanitize equipment before off-site maintenance to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control MA.L2-3.7.3, with practical examples, technical commands, and documentation templates you can adopt immediately.

Why sanitization matters for CUI and the compliance context

MA.L2-3.7.3 requires organizations to sanitize equipment (including electronic media and devices) before sending it off-site for maintenance so that Controlled Unclassified Information (CUI) is not exposed. Failure to do so can lead to unauthorized disclosure, contract penalties, incident response costs, loss of DoD work, and reputational damage. For small businesses that handle design documents, test results, or system configurations considered CUI, a lightweight but auditable sanitization program is a practical requirement β€” not a theoretical one.

Overview: build the checklist around four phases

Create a checklist that maps to four phases: (1) Pre-approval & risk assessment, (2) Data removal & sanitization selection, (3) Verification & documentation, and (4) Post-return validation and acceptance. Each phase should have discrete, verifiable steps, assigned owners, and a retention policy for artifacts (e.g., signed sanitization forms, screenshots, serial numbers, and chain-of-custody records). Use NIST SP 800-88 Rev.1 as the authoritative technical reference for media sanitization methods and record the chosen method for each device type.

Phase 1 β€” Pre-approval and classification

Checklist items: identify device type, classify data (is CUI present?), decide whether off-site maintenance is allowed, and obtain manager approval. Example: a small avionics subcontractor flags a laptop because it contains CUI CAD files β€” the checklist should require either (a) perform maintenance onsite, (b) remove or isolate CUI before shipping, or (c) use an approved repair vendor under a current NDAs and controlled environment. Document the decision on a simple form: device asset tag, serial number, reason for repair, destination vendor, authorized approver, date, and whether maintenance will be done on-site or off-site.

Phase 2 β€” Data removal and sanitization actions (technical details)

Choose sanitization method by media type following NIST SP 800-88: for HDDs, verified multi-pass overwrite or cryptographic erasure; for SSDs and NVMe, use vendor Secure Erase / NVMe Format or cryptographic erase (destroy keys); for removable flash, use vendor tools or physical destruction if necessary; for embedded devices (IoT, NVRs, printers), perform factory reset and clear onboard storage with the manufacturer's wipe utilities and confirm via console. Practical commands: use hdparm --user-master u --security-erase NULL /dev/sdX for ATA secure-erase (HDD/SSD where supported), nvme format /dev/nvme0n1 to perform controller-level sanitize on NVMe, and cryptsetup luksKillSlot to remove LUKS keys after ensuring no plaintext remains. For Windows systems, prefer full-disk encryption (BitLocker) and remove keys before shipping (do not send recovery keys); for Macs use FileVault and disable by deleting recovery keys and performing a secure erase of free space if required. Note: avoid dd zeroing as a reliable SSD sanitize method β€” prefer vendor-supported crypto-erase or sanitize commands.

Phase 3 β€” Verification, evidence capture, and chain-of-custody

Verification must be independent and auditable. Checklist items: capture serial numbers and device photos before and after sanitization; record exact commands, timestamps, and operator IDs; require a second verifier to sign off on the sanitization result; create a chain-of-custody form when shipping (who handled it, when, and how). For third-party repairs, require the vendor to provide a signed sanitization certificate that lists the device, method, and evidence (logs or screenshots). Retain this documentation for the contractually required period (commonly 3–6 years for DoD subcontractors) to demonstrate compliance during audits.

Real-world small-business scenarios

Example 1 β€” Laptop repair: A small software firm encrypts all laptops with BitLocker. Before sending a laptop to a vendor, the IT admin removes CUI by copying business-critical files to secured servers, verifies no CUI in user profiles, and then re-images the laptop locally. If reimaging onsite isn't possible, the organization performs a full disk cryptographic erase (destroying the key), documents the operation, and ships the device; upon return IT re-provisions and restores only sanitized backups. Example 2 β€” Network NVR repair: a small security integrator removes all recorded footage, factory-resets the NVR, documents the command output, and provides the vendor with sanitized config files (no plain credentials). If the NVR's drive can't be sanitized, the firm removes the drive and either sanitizes or physically destroys it before shipping the chassis.

Compliance tips and best practices

Prefer minimizing off-site repairs for devices that store CUI; require vendors to maintain CMMC or equivalent controls where feasible. Maintain a short authorized vendors list with signed Data Processing Agreements or NDAs. Automate evidence collection where possible: scripted sanitize-and-log procedures (PowerShell or Ansible) that produce a signed artifact simplify audits. Include a conditional step in procurement: buy devices with hardware-based crypto (SEDs, TPMs) to enable safe crypto-erase workflows. Train non-IT staff to recognize CUI and enforce β€œdo not send” lists for unapproved device types (e.g., servers with attached storage, printers with HDDs).

Risks of not implementing the checklist

Without formal sanitization, CUI can be exposed to unauthorized personnel during repair operations, leading to data breach notifications, contractual violations, financial penalties, or revocation of DoD access. Operational risks include malware introduction from untrusted repair environments and loss of intellectual property. Audit risk increases: during an assessment, inability to produce sanitization records or evidence of vendor controls can result in findings that block contract awards or require costly remediation actions.

Summary β€” build a simple, auditable program that scales: adopt NIST SP 800-88 guidance, implement the four-phase checklist (pre-approval, sanitize, verify, and validate on return), require documented vendor guarantees, and prefer cryptographic controls and onsite repair where practical. For small businesses, minimal overhead (a checklist form, a few vendor agreements, and some scripted sanitization commands) will produce strong protection for CUI and evidence required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.3.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes