🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Choose the Right Sanitization Methods (Overwrite, Degauss, Physical Destruction) for FCI: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII Guide

Practical guidance to choose and implement overwrite, degauss, and physical destruction methods to sanitize Federal Contract Information (FCI) and meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 05, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide helps small businesses and compliance teams choose and implement the correct sanitization method — overwrite, degauss, or physical destruction — to protect Federal Contract Information (FCI) and meet FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII requirements, with practical steps, tools, and examples you can apply immediately.

Understanding the Compliance Framework requirement

Under the Compliance Framework context (FAR 52.204-21 and CMMC 2.0 Level 1), the objective is straightforward: when FCI is stored on media that is no longer needed, the organization must sanitize or destroy that media so the FCI cannot be reconstructed. For small businesses this maps to a few concrete obligations: maintain an inventory of media that can contain FCI, apply an approved sanitization method appropriate to the media type, verify and log the action, and be able to produce records during audit or self-assessment. Implementation notes: incorporate sanitization into asset lifecycle (procure → operate → retire → dispose), identify media owners, and codify the decision criteria in a sanitization policy or playbook.

Choose the right method by media type and risk

Sanitization is not one-size-fits-all. Key media types and recommended approaches are: hard disk drives (HDDs) — overwrite (single-pass or vendor tool) or degauss (if you own a validated degausser) or physical destruction; solid-state drives (SSDs) and NVMe — prefer manufacturer Secure Erase / NVMe Sanitize or cryptographic erase (destroy keys) and, if unavailable or untrusted, physical destruction; magnetic tape — degauss or physical destruction; optical media (CD/DVD) — physical destruction; removable USB flash and eMMC — cryptographic erase or physical destruction. Use NIST SP 800-88 Rev. 1 as the technical baseline for selecting methods, and remember that traditional multi-pass overwrites used for very old magnetic media are generally unnecessary on modern drives but also ineffective on many SSDs because of wear leveling.

Technical notes on specific methods

Overwrite: Tools such as Linux shred/dd or vendor utilities can perform overwrites for HDDs. Modern guidance (NIST 800-88) permits a single-pass overwrite for many modern magnetic drives, but verify by drive type and vendor. For SSDs, use ATA Secure Erase (hdparm --security-erase) or NVMe Format with sanitize options; manufacturer utilities (e.g., Samsung Magician, Intel SSD Toolbox) are preferred. Cryptographic erase (destroying the encryption keys for an encrypted drive) is an efficient, verifiable approach when full-disk encryption (FDE) has been in place from deployment — ensure keys were never stored unprotected. Always test commands on non-production units first and follow vendor instructions (improper use can brick drives or leave data recoverable).

Degaussing and physical destruction details

Degaussing is effective for magnetic media (HDD platters, magnetic tape) by removing magnetic domains so data cannot be recovered; it requires a degausser with sufficient gauss/Tesla rating and the right waveform for the media type, and it will render drives unusable. Degaussing does not work on SSDs or optical media. Physical destruction options include shredding (mechanical), crushing (platters), puncturing controllers, or incineration. For SSDs, mechanical shredding or specialist electronic media pulverizers are the most reliable. If using a third-party vendor, request a Certificate of Destruction and chain-of-custody documentation; for in-house destruction, photograph and log serial numbers and method performed.

Practical implementation steps and a small-business scenario

Actionable process you can implement this week: 1) Create an inventory of assets that can contain FCI (workstations, laptops, backups, removable media). 2) Classify each asset by media type and determine the default sanitization method (decision matrix). 3) For devices using FDE, adopt key-management procedures so cryptographic erase is valid (store keys in HSM or enterprise key manager). 4) Define acceptance criteria and verification steps (e.g., attempt to mount after overwrite, inspect degausser logs, retain COI from vendor). 5) Train staff and document the process. Example: a small contractor replaces laptops yearly — before reassigning or disposing, IT runs manufacturer secure-erase on SSDs; for older laptops with unknown history, the IT manager uses a shredding vendor and keeps the Certificate of Destruction attached to the asset tag in the asset record.

Compliance tips, verification, and best practices

Maintain an auditable trail: logs should show asset ID, serial number, method used, operator, date/time, tool/version, and verification result. Use standardized forms or an asset management system to hold this metadata. Prefer FDE from day one — it allows fast crypto-erase when retiring assets. When outsourcing, vet vendors for insurance, environmental compliance, and the ability to provide a chain-of-custody and Certificate of Destruction. Perform periodic validation: sample drives after overwriting or vendor reports, and periodically test your degausser with witness media per manufacturer guidance. Train anyone authorized to sanitize or destroy media and restrict the process to authorized personnel.

Risks of not implementing include unauthorized disclosure of FCI, breach notifications, lost contracts, contractual penalties under FAR 52.204-21, and reputational damage; technically, improperly sanitized media is a primary root cause of data exposures during property disposition or resales. From an operational perspective, inadequate sanitization also increases legal and cleanup costs and can trigger additional oversight from contracting agencies.

Summary: map media types to methods (overwrite for HDD where appropriate, secure-erase/crypto-erase for SSDs, degauss for tape/HDD where validated, physical destruction when in doubt), codify the decision matrix in policy, log and verify every sanitization event, and prefer FDE and vetted destruction vendors to simplify compliance. For small businesses seeking to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII, these practical steps — inventory, method selection, verification, documentation, and training — will materially reduce risk and make annual self-assessments straightforward.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes