{
  "title": "How to Choose and Use Approved Tools to Sanitize or Destroy Hard Drives, SSDs, and USBs Holding FCI — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII",
  "date": "2026-04-16",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-choose-and-use-approved-tools-to-sanitize-or-destroy-hard-drives-ssds-and-usbs-holding-fci-far-52204-21-cmmc-20-level-1-control-mpl1-b1vii.jpg",
  "content": {
    "full_html": "<p>Federal Contract Information (FCI) must not survive disposal in a form that can be recovered — FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) require contractors to sanitize or destroy media before disposal or reuse; this post gives small businesses practical, tool-specific guidance and examples for hard drives, SSDs, and USB/flash media so you can create compliant processes, choose approved tools, and produce audit-ready evidence.</p>\n\n<h2>Deciding: sanitize (clear/purge) vs. destroy (physical)</h2>\n<p>Start with a simple decision matrix: if the device will be redeployed within your organization, choose a validated sanitization method (clearing or purging). If the device is being sent off-site to a recycler, sold, or the media is damaged or high-risk, choose physical destruction. Factors that should affect your decision include media type (HDD vs SSD vs USB), sensitivity of the FCI, intended reuse, contract-specific requirements, and cost. Document this decision as part of your asset disposition policy and record the rationale — auditors expect evidence that you considered media type and reuse.</p>\n\n<h3>Hard disk drives (HDDs) — best practices and tools</h3>\n<p>For magnetic HDDs, NIST SP 800-88 Rev. 1 provides guidance: a single pass overwrite to clear is typically acceptable for clearing purposes; purge (e.g., degaussing or physical destruction) is required for higher assurance or when the drive will leave your control. Practical tools: DBAN (Darik's Boot and Nuke) or commercial products like Blancco Drive Eraser and WhiteCanyon WipeDrive for overwrite-based clearing; Linux dd (dd if=/dev/zero of=/dev/sdX bs=1M) can be used in small shops for one-pass overwrites, but ensure verification after completion. For purge-level assurance, use a certified degausser for magnetic media or a shredding vendor that provides a Certificate of Destruction (CoD). Small business example: a 20-seat engineering shop runs a nightly script to zero internal HDDs scheduled for reuse and retains logs; drives sent for resale are shredded with an on-site witness and CoD.</p>\n\n<h3>SSDs and NVMe — use secure/cryptographic erase, not naive overwrite</h3>\n<p>SSDs and NVMe devices use wear-leveling and over-provisioning; simple overwrite (dd) may not sanitize all physical blocks. Prefer the device's built-in secure erase (ATA Secure Erase) or NVMe format secure erase; vendor utilities (Samsung Magician, Intel Toolbox) or tools like hdparm and nvme-cli (nvme format with secure erase options) can invoke these features. When full-disk hardware encryption is enabled (e.g., self-encrypting drives or Windows BitLocker with no key escrow), cryptographic erasure (destroying or deleting the encryption key) can be a fast, high-assurance method — document key management and key destruction. Commercial erasure software certified for SSDs (e.g., Blancco) is recommended for audit evidence. Important warnings: degaussing does not reliably affect SSDs; shredding is the most certain destruction if you cannot ensure a proper secure erase.</p>\n\n<h3>USB flash drives and removable flash — treat like SSDs</h3>\n<p>USB flash sticks and SD cards have similar wear-leveling issues to SSDs. For internal reuse, a multi-pass overwrite may clear some logical areas but is not guaranteed; prefer firmware/vendor secure erase if available, or cryptographic erase when the device supports hardware encryption. For devices sent off-site, physical destruction (shredding or disintegration) is typically the simplest and most defensible choice. Example: a small contractor that hands out branded USBs with FCI decides to never repurpose returned sticks — they collect and send them to a certified destruction service and maintain CoDs and photos for each vendor shipment.</p>\n\n<h2>Implementing SOPs, verification, and evidence collection</h2>\n<p>Create a short, actionable SOP that covers: inventory and classification (tag media with owner and sensitivity), selection matrix (sanitize vs destroy), approved tools per media type, step-by-step execution, verification steps, logging, chain-of-custody, and retention of evidence. Verification examples: erasure tool reports (Blancco report PDFs), logs with timestamps and operator ID, sample hashes of zeroed partitions, screenshots of vendor utility confirmations, and photos of shredded media with batch IDs. Retain evidence for the period required by your contract; if unspecified, retain for at least the contract term plus 3 years and note retention policy in your System Security Plan (or equivalent Compliance Framework documentation).</p>\n\n<h3>Choosing third-party destruction vendors and building trust</h3>\n<p>If you use a vendor for shredding or degaussing, vet them: request ISO 9001/14001 certifications where applicable, confirm NAID AAA or similar industry credentials, require a Certificate of Destruction with serial numbers/batch IDs, and prefer on-site shredding with witness capability for higher-risk disposals. Small businesses can use consolidated pickup services or mail-back programs, but always check chain-of-custody procedures and insurance limits. Include contractual SLAs and right-to-audit clauses in vendor agreements so you can supply auditors with proof you used an approved service.</p>\n\n<p>Non-compliance risks are tangible: residual FCI on disposed media can lead to data breaches, mandatory breach notifications, loss of contracts, damages, fines, and reputational harm. From a compliance perspective, failure to sanitize/destroy properly is easy for auditors to detect (missing CoDs, incomplete erasure logs, reused devices with recoverable data) and hard to remediate after the fact. Mitigate this risk with preventive controls (policy, training, approved tools), detective controls (periodic spot audits and test restores or data recovery checks), and strong documentation.</p>\n\n<p>Summary: Build a concise disposition workflow that maps media type to an approved tool or destruction method, document and verify every job, use SSD-aware tools (secure erase or cryptographic erase) rather than naive overwrites, and maintain evidence (erasure reports, CoDs, chain-of-custody) to demonstrate compliance with FAR 52.204-21 and CMMC 2.0 MP.L1-B.1.VII. For small businesses, practical steps include creating an asset register, designating approved tools (e.g., Blancco, vendor utilities, hdparm/nvme-cli for controlled use), deciding reuse vs. destruction upfront, and contracting certified destruction vendors to close the loop for media leaving your control.</p>",
    "plain_text": "Federal Contract Information (FCI) must not survive disposal in a form that can be recovered — FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) require contractors to sanitize or destroy media before disposal or reuse; this post gives small businesses practical, tool-specific guidance and examples for hard drives, SSDs, and USB/flash media so you can create compliant processes, choose approved tools, and produce audit-ready evidence.\n\nDeciding: sanitize (clear/purge) vs. destroy (physical)\nStart with a simple decision matrix: if the device will be redeployed within your organization, choose a validated sanitization method (clearing or purging). If the device is being sent off-site to a recycler, sold, or the media is damaged or high-risk, choose physical destruction. Factors that should affect your decision include media type (HDD vs SSD vs USB), sensitivity of the FCI, intended reuse, contract-specific requirements, and cost. Document this decision as part of your asset disposition policy and record the rationale — auditors expect evidence that you considered media type and reuse.\n\nHard disk drives (HDDs) — best practices and tools\nFor magnetic HDDs, NIST SP 800-88 Rev. 1 provides guidance: a single pass overwrite to clear is typically acceptable for clearing purposes; purge (e.g., degaussing or physical destruction) is required for higher assurance or when the drive will leave your control. Practical tools: DBAN (Darik's Boot and Nuke) or commercial products like Blancco Drive Eraser and WhiteCanyon WipeDrive for overwrite-based clearing; Linux dd (dd if=/dev/zero of=/dev/sdX bs=1M) can be used in small shops for one-pass overwrites, but ensure verification after completion. For purge-level assurance, use a certified degausser for magnetic media or a shredding vendor that provides a Certificate of Destruction (CoD). Small business example: a 20-seat engineering shop runs a nightly script to zero internal HDDs scheduled for reuse and retains logs; drives sent for resale are shredded with an on-site witness and CoD.\n\nSSDs and NVMe — use secure/cryptographic erase, not naive overwrite\nSSDs and NVMe devices use wear-leveling and over-provisioning; simple overwrite (dd) may not sanitize all physical blocks. Prefer the device's built-in secure erase (ATA Secure Erase) or NVMe format secure erase; vendor utilities (Samsung Magician, Intel Toolbox) or tools like hdparm and nvme-cli (nvme format with secure erase options) can invoke these features. When full-disk hardware encryption is enabled (e.g., self-encrypting drives or Windows BitLocker with no key escrow), cryptographic erasure (destroying or deleting the encryption key) can be a fast, high-assurance method — document key management and key destruction. Commercial erasure software certified for SSDs (e.g., Blancco) is recommended for audit evidence. Important warnings: degaussing does not reliably affect SSDs; shredding is the most certain destruction if you cannot ensure a proper secure erase.\n\nUSB flash drives and removable flash — treat like SSDs\nUSB flash sticks and SD cards have similar wear-leveling issues to SSDs. For internal reuse, a multi-pass overwrite may clear some logical areas but is not guaranteed; prefer firmware/vendor secure erase if available, or cryptographic erase when the device supports hardware encryption. For devices sent off-site, physical destruction (shredding or disintegration) is typically the simplest and most defensible choice. Example: a small contractor that hands out branded USBs with FCI decides to never repurpose returned sticks — they collect and send them to a certified destruction service and maintain CoDs and photos for each vendor shipment.\n\nImplementing SOPs, verification, and evidence collection\nCreate a short, actionable SOP that covers: inventory and classification (tag media with owner and sensitivity), selection matrix (sanitize vs destroy), approved tools per media type, step-by-step execution, verification steps, logging, chain-of-custody, and retention of evidence. Verification examples: erasure tool reports (Blancco report PDFs), logs with timestamps and operator ID, sample hashes of zeroed partitions, screenshots of vendor utility confirmations, and photos of shredded media with batch IDs. Retain evidence for the period required by your contract; if unspecified, retain for at least the contract term plus 3 years and note retention policy in your System Security Plan (or equivalent Compliance Framework documentation).\n\nChoosing third-party destruction vendors and building trust\nIf you use a vendor for shredding or degaussing, vet them: request ISO 9001/14001 certifications where applicable, confirm NAID AAA or similar industry credentials, require a Certificate of Destruction with serial numbers/batch IDs, and prefer on-site shredding with witness capability for higher-risk disposals. Small businesses can use consolidated pickup services or mail-back programs, but always check chain-of-custody procedures and insurance limits. Include contractual SLAs and right-to-audit clauses in vendor agreements so you can supply auditors with proof you used an approved service.\n\nNon-compliance risks are tangible: residual FCI on disposed media can lead to data breaches, mandatory breach notifications, loss of contracts, damages, fines, and reputational harm. From a compliance perspective, failure to sanitize/destroy properly is easy for auditors to detect (missing CoDs, incomplete erasure logs, reused devices with recoverable data) and hard to remediate after the fact. Mitigate this risk with preventive controls (policy, training, approved tools), detective controls (periodic spot audits and test restores or data recovery checks), and strong documentation.\n\nSummary: Build a concise disposition workflow that maps media type to an approved tool or destruction method, document and verify every job, use SSD-aware tools (secure erase or cryptographic erase) rather than naive overwrites, and maintain evidence (erasure reports, CoDs, chain-of-custody) to demonstrate compliance with FAR 52.204-21 and CMMC 2.0 MP.L1-B.1.VII. For small businesses, practical steps include creating an asset register, designating approved tools (e.g., Blancco, vendor utilities, hdparm/nvme-cli for controlled use), deciding reuse vs. destruction upfront, and contracting certified destruction vendors to close the loop for media leaving your control."
  },
  "metadata": {
    "description": "Step-by-step guidance to select and operate approved sanitization and destruction tools for hard drives, SSDs, and USBs holding Federal Contract Information to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII.",
    "permalink": "/how-to-choose-and-use-approved-tools-to-sanitize-or-destroy-hard-drives-ssds-and-usbs-holding-fci-far-52204-21-cmmc-20-level-1-control-mpl1-b1vii.json",
    "categories": [],
    "tags": []
  }
}