🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Secure Media Disposal Program for Small Contractors: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII Practical Guide

Practical, step-by-step guidance for small contractors to implement a compliant media disposal program that meets FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

•
March 28, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Small contractors handling Controlled Unclassified Information (CUI) must implement a secure media disposal program to satisfy FAR 52.204-21 and the CMMC 2.0 Level 1 control MP.L1-B.1.V.II; this practical guide translates those requirements into an affordable, repeatable program that fits the realities of small teams and limited budgets.

Scope: What media must you track and sanitize?

Begin by scoping all media types in use: laptops/desktops (HDD/SSD), removable drives (USB/SD), mobile phones/tablets, backup tapes, optical media (CD/DVD), printed documents, and cloud backups exported to physical media. Create a simple inventory (spreadsheet or small asset-management tool) with columns for asset tag/serial, media type, CUI presence (yes/no), last known user, storage location, and disposition status. For the Compliance Framework context, document the criteria used to classify media as containing CUI—this is evidence you applied a consistent policy rather than ad hoc decisions.

Real-world small-business example

A 12-person engineering subcontractor implemented a two-column inventory indicating whether a device ever stored CUI. Laptops with a "CUI: yes" flag were routed to a secure disposal queue; devices flagged "CUI: no" were handled per normal IT asset policy. This allowed the team to prioritize secure sanitization for a small subset of assets without overburdening staff.

Sanitization methods: choose the right method for the media

Use NIST SP 800-88 Rev. 1 guidance when selecting a sanitization method: Clear (logical erase), Purge (cryptographic erase or vendor-specific secure erase), or Destroy (physical destruction). For HDDs, multiple-pass overwrites or an ATA Secure Erase are acceptable; for SSDs and NVMe, rely on manufacturer secure-erase/format commands or cryptographic erasure (destroy the encryption key) rather than overwrites. Optical media and paper require physical destruction—shredding or cross-cut shredders for paper, incineration or physical pulverization for discs. Tapes and decommissioned backup media are typically purged via degaussing (for magnetically recorded tape) followed by shredding or certified destruction.

Technical specifics & tools

Practical tools and commands small IT teams can use: Linux hdparm --security-erase for SATA HDDs (ensure passwords and drive support), nvme format or nvme-cli for NVMe drives, blkdiscard or secure-erase utilities where supported, and cryptographic erasure by destroying the encryption key for drives protected with FDE (BitLocker, LUKS). For verification, use hashes (pre/post) or vendor verification logs; for enterprise-level assurance consider commercial tools like Blancco. Note: quick format or simple reformat is not sufficient for CUI on most media types.

Implementation steps: a 6-step program for small contractors

1) Policy & roles — publish a short media disposal policy mapping to Compliance Framework controls and assign a Media Custodian. 2) Inventory & classification — maintain the spreadsheet and tag media that contained CUI. 3) Pre-disposition — ensure backups removed and users sign off on decommission. 4) Sanitization action — select per-media method (cryptographic erase if FDE used, secure-erase for HDD/SSD, shredding for paper). 5) Verification — sample-verify wipes or review vendor certificates. 6) Recordkeeping — retain chain-of-custody logs and certificates of destruction with dates, methods, and personnel signatures for audits. Implement these as a short checklist in your IT SOPs so the small team can follow it consistently.

Third-party vendors and certificates

Many small contractors will use a certified destruction vendor. Require (1) on-site destruction option or sealed transport, (2) a Chain-of-Custody form, and (3) a Certificate of Destruction (CoD) that lists serial numbers and methods (degauss, shred, melt). Validate vendor credentials (NAID AAA certification or equivalent) and include vendor selection criteria in your procurement records so you can demonstrate due diligence for FAR/CMMC reviews. Keep CoDs and transport receipts for the period specified by contract or organizational policy (commonly 3 years).

Risks of not implementing secure disposal

Failing to sanitize media properly exposes CUI to data breaches, potential loss of contracts, civil penalties, and reputational damage. Poor disposal practices (e.g., throwing drives in recycling without wiping) have led to lost IP and retaliation from prime contractors. From a compliance perspective, a documented disposal failure can trigger contract remediation under FAR 52.204-21 and negatively impact your CMMC assessment results. Small businesses are prime targets because attackers assume weaker controls—don’t give them that advantage.

Compliance tips and best practices

Keep these practical controls: always encrypt work devices (FDE) so cryptographic erasure is an option; segment CUI onto identifiable devices when possible; automate inventory updates at de-provisioning; train staff yearly on disposal steps; perform periodic sampling audits (e.g., wipe-verification of 10% of disposed items); and budget for a trusted third-party destruction vendor. For cost-conscious shops, buy a small heavy-duty cross-cut shredder for paper and a simple drive crusher or crushing service for a handful of end-of-life drives—balance cost against risk and volume.

Summary: Implementing a secure media disposal program for small contractors is achievable with a concise policy, a maintained inventory, appropriate sanitization methods per NIST SP 800-88, verification and recordkeeping, and the use of trusted vendors when needed; following these practical steps helps you meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.V.II requirements while reducing the risk of data exposure and contractual penalties.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes