🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Destroy SSDs and HDDs: Step-by-Step Methods to Satisfy FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Step‑by‑step, practical guidance to sanitize and destroy SSDs and HDDs in order to meet FAR 52.204-21 and CMMC 2.0 Level 1 media protection requirements.

April 03, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Properly sanitizing and destroying storage media is a foundational action for meeting Compliance Framework requirements such as FAR 52.204-21 and CMMC 2.0 Level 1 (Control MP.L1-B.1.VII); this post gives small businesses actionable, practical steps—aligned to NIST SP 800‑88 concepts—for securely disposing of both HDDs and SSDs, with implementation notes, real-world scenarios, vendor considerations, and risk mitigation tips.

High-level approach: Clear, Purge, Destroy (and how it maps to the Compliance Framework)

Compliance Framework guidance is satisfied when media containing sensitive or controlled information is handled according to a documented policy and rendered unintelligible before leaving your custody. Use the NIST SP 800‑88 model: first evaluate whether media can be Cleared (logical overwrites), Purged (crypto-erase, degauss where applicable), or Destroyed (physical destruction). For FAR 52.204-21 and CMMC Level 1, you must have procedures and evidence that media is sanitized or destroyed when no longer required—document which method you used and keep a certificate of destruction (CoD) or equivalent evidence.

Step-by-step method for HDDs (mechanical hard drives)

HDDs store data magnetically and respond well to standard overwrite and degauss techniques; choose based on reuse plan and risk profile. Practical steps: 1) Inventory and tag each drive (serial, asset tag, system owner). 2) If you plan to reuse in non-sensitive systems, perform a verified overwrite (single-pass random or zeroes is acceptable per NIST SP 800‑88 for many cases). Use enterprise tools that produce a verification log. 3) If reuse is not intended or data is classified/sensitive, perform a purge by degaussing with an industrial-grade degausser rated for the drive’s coercivity (this will render the HDD inoperable). 4) For highest assurance, physically destroy (shred/disintegrate/crush) the platters. 5) Record chain-of-custody and obtain a CoD from internal or third‑party destruction. Implementation notes: test your overwrites on a sample drive to verify recoverability is gone before relying on overwrite-only methods, and ensure the degausser is calibrated to vendor recommendations.

Technical details for HDDs

Overwrite methods require access to the whole disk surface; hardware RAID and remapped sectors can retain data, so verify vendor logs. Degaussing requires a device capable of producing the appropriate magnetic field strength; a reputable service will provide equipment calibration records. Physical destruction options include shredding (mechanical disintegration) or using a hard drive crusher—select a method that prevents platter recovery and document the process.

Step-by-step method for SSDs (solid-state drives and flash)

SSDs use non‑magnetic NAND with wear‑leveling, so traditional overwriting is unreliable. Practical steps: 1) Preferentially use full‑disk encryption from deployment; destroy the key to crypto-erase when retiring media. 2) If encryption was not used, use supported secure-erase functions: ATA Secure Erase, NVMe Format (secure erase), or vendor utilities (Samsung, Intel, etc.)—follow vendor instructions and verify completion. 3) If secure-erase is unsupported, or if the SSD contained highly sensitive data, perform physical destruction (shredding/disintegration) to a level that prevents chip or package reconstruction. 4) Maintain documentation and a CoD. Implementation notes: never rely on factory resets, reformat, or single overwrites as the sole method for SSD sanitization.

Technical details for SSDs

Because wear‑leveling, overprovisioning, and remapped blocks can leave residual data, crypto‑erase or built‑in secure-erase commands are the preferred "purge" methods. Crypto‑erase — destroying the encryption key — is fast and scalable if full-disk encryption has been used from first use. If secure erase commands are used, verify device state after the operation and log serial numbers. For physical destruction, ensure the method fragments silicon chips and controller packages, not just the casing.

Implementation specifics for a small business following Compliance Framework

Operationalize media destruction with these concrete steps: maintain an up‑to‑date asset register; categorize media by sensitivity; establish a documented sanitization policy that references NIST SP 800‑88 and maps to FAR/CMMC requirements; designate in‑house vs third‑party destruction; produce and retain a CoD for each destroyed asset; and run quarterly audits. For in‑house operations, use a staging area with locked access, trained personnel, tamper-evident seals, and audit logs. For third‑party vendors, require proof of insurance, proof of equipment/calibration, background-checked personnel, and a sample CoD template in the contract.

Real-world small business scenarios and examples

Example 1: A 25-person engineering firm retiring 15 laptops with SSDs—policy says enroll all endpoints with full-disk encryption (BitLocker/FileVault) at procurement. When decommissioned, remove devices from MDM, delete the encryption key from the key-management system (crypto-erase), then physically destroy any SSDs that failed secure-erase and retain CoDs. Example 2: A small contractor has a single server with RAID HDDs—disable RAID, remove drives, run verified overwrites if drives will be repurposed internally; otherwise, contract local certified media destruction with signed CoDs. These approaches minimize cost while meeting Compliance Framework obligations.

Compliance tips, best practices and documentation

Best practices: adopt encryption from day one (reduces disposal friction), maintain a media destruction SOP that names responsible staff, use tamper-evident transport and chain-of-custody forms, schedule regular destruction windows, and include destruction records in your contract compliance evidence. When using vendors, require searchable CoDs with serial numbers and method used (clear/purge/destroy). Train employees on spotting media (external drives, old phones, USB sticks) and include media destruction checklist items in offboarding and retirement workflows.

Risks of not implementing proper sanitization and destruction

Failing to sanitize or destroy storage media elevates the risk of data breaches, including leakage of proprietary information or controlled unclassified information (CUI), which can lead to loss of contracts, penalties, remediation costs, and reputational harm. From a compliance standpoint, inadequate evidence of sanitization can result in failing FAR or CMMC assessments and audit findings—simple steps now avoid expensive incident response and possible contract disqualification later.

In summary, satisfying FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) requires a documented, repeatable approach to media sanitization: inventory and classify media, prefer encryption and crypto-erase, use vendor-supported secure-erase or degauss for magnetic media, and physically destroy when necessary—always preserving chain-of-custody and certificates of destruction. For small businesses, balancing in‑house methods and certified third‑party services, backed by clear procedures and logs, provides strong, auditable evidence of compliance while mitigating data‑leak risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes