🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Choose Between Software Erasure, Degaussing, and Physical Destruction for FCI: Decision Guide for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

A practical decision guide for small businesses on choosing software erasure, degaussing, or physical destruction to sanitize media holding Federal Contract Information under FAR 52.204-21 and CMMC 2.0 Level 1.

•
April 17, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide helps small businesses meet FAR 52.204-21 and the CMMC 2.0 Level 1 control MP.L1-B.1.VII by explaining when to use software erasure, degaussing, or physical destruction to sanitize media containing Federal Contract Information (FCI), with concrete steps, tools, verification methods, and real-world examples for practical implementation.

Understand the requirement and scope

Under FAR 52.204-21 contractors must adequately safeguard FCI; CMMC 2.0 Level 1 control MP.L1-B.1.VII maps to media protection activities such as sanitization or destruction before media leave controlled environments. Implementation notes for the Compliance Framework require a documented policy, an inventory of media containing FCI, and demonstrable evidence (logs, certificates, or chain-of-custody records) that media were sanitized or destroyed. The objective is simple: make FCI unrecoverable by any reasonably available means before reuse, redistribution, or disposal.

Assess media type and data sensitivity

Start by classifying the media (HDD, SSD/NVMe, USB flash, mobile device storage, optical media, or magnetic tape) and the sensitivity of the data (FCI vs other). Different media require different methods: traditional degaussing works for magnetic media (HDDs and tapes) but is ineffective for NAND-based flash (SSDs, USB drives, many mobile devices). Software overwrite and vendor secure-erase commands work well for many HDDs and some SSDs (when supported), while cryptographic erase (destroying encryption keys) can be the fastest, most verifiable method for drives encrypted with FDE/TCG Opal. Reference NIST SP 800-88r1 as the technical baseline for selecting sanitization methods, and ensure your local Compliance Framework policy cites it where appropriate.

Software erasure: methods and practical steps

Software erasure is appropriate when media are going to be reused or returned and the media type supports it. For HDDs use ATA Secure Erase (example commands on Linux: set a temporary password and run hdparm --user-master u --security-set-pass P /dev/sdX followed by hdparm --security-erase P /dev/sdX). For NVMe/SSD use nvme-cli: nvme format /dev/nvme0n1 --ses=1 (or vendor-specific secure-erase tools). Commercial certified erasure tools (Blancco, WhiteCanyon) provide logs and certificates that map to compliance requirements and are strongly recommended for high-assurance use. Avoid DBAN for SSDs—overwriting does not guarantee data removal due to wear-leveling and TRIM. For drives encrypted at rest, certify cryptographic erase by destroying keys and recording key destruction events (this is acceptable in the Compliance Framework if you can prove the crypto was applied to all media and keys are unrecoverable).

Degaussing: when and how to use it

Degaussing is effective for magnetic media (hard disk platters and magnetic tape) when you have a degausser rated for the media type. Important implementation details: use a degausser with a vendor-specified field strength appropriate for the media, perform regular calibration and test runs, and maintain a log of device serial numbers, media serial numbers, operator, date/time, and verification result. Note two critical limitations: degaussing typically destroys drive electronics and renders the drive unusable, and it will not reliably sanitize SSDs or devices with encryption metadata stored off-platter. Always confirm a successful degauss with verification steps (attempting to read device headers or using vendor test tools) and retain a Certificate of Destruction (CoD) for the Compliance Framework audit trail.

Physical destruction: methods, requirements, and environmental considerations

Physical destruction is the safest option when media are highly sensitive, unsupported by software erase, or when disposal is required. Options include industrial shredding (single-pass hard drive shredders to particle sizes specified in your policy—NIST suggests reduction to small fragments for high-assurance sanitization), crushing (for smaller volumes), and incineration under regulated facilities. For SSDs, multiple methods should be combined: physical destruction of the NAND chips plus crypto-erase where possible. Use certified vendors that provide chain-of-custody, environmental disposal compliance (e-waste rules), and a CoD. In-house destruction needs documented SOPs, PPE, and waste-handling plans to satisfy the Compliance Framework and environmental laws—most small businesses find vendor services more practical and auditable.

Decision workflow and small-business scenarios

Use this simple workflow: 1) Inventory media and map to FCI, 2) Identify media type, 3) Choose the least-destructive approved method that achieves sanitization (software erase for reusable HDDs where verifiable; degauss for magnetic media to be destroyed or recycled; physical destruction for SSDs or highly sensitive FCI), 4) Execute, verify, and record. Example A: a small engineering firm retiring 10 laptops—ensure full-disk encryption while in use, run ATA Secure Erase or vendor wipe, verify with logs, and keep CoD for each asset. Example B: backup tapes from a contract cycle—use a rated degausser, then physically shred or recycle, and retain CoD. Example C: USB drives handed back by a subcontractor—prefer physical destruction or certified commercial erasure with a certificate because of unknown prior storage conditions.

Compliance tips, verification, and risk of non-implementation

Best practices: include sanitization steps in your Media Protection SOP and asset disposal checklist; require certificates of erasure/destruction from third-party vendors; keep retention of logs per your contract and Compliance Framework; train personnel on chain-of-custody and evidence collection; batch serial numbers and CoDs for audit review. Verification techniques include sampling sanitized media to attempt data recovery, retaining tool-generated hashes or logs (erasure tool output, hdparm/nvme return codes), and recording operator ID and timestamps. The risk of not implementing these controls includes exposure of FCI (leading to loss of competitive advantage or contractor reputation), contractual penalties, potential debarment, and increased likelihood of a breach reportable under FAR and applicable laws.

Summary: For Compliance Framework alignment with FAR 52.204-21 and CMMC MP.L1-B.1.VII, pick the sanitization method based on media type and reuse goals—software erasure (with certified tools and verification) for reusable magnetic media, degaussing for magnetic media slated for destruction or recycling, and physical destruction for SSDs and media with high sensitivity. Document your inventory, methods, verification, and chain-of-custody; use accredited vendors when possible; and maintain evidence so auditors can confirm FCI was rendered unrecoverable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes