🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement a Step-by-Step Media Sanitization Process for FCI Disposal and Reuse — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step-by-step guidance for small businesses to sanitize media containing Federal Contract Information (FCI) to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements.

April 04, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing a repeatable media sanitization program is critical to protect Federal Contract Information (FCI) and demonstrate compliance with FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII); this post provides a practical, step-by-step process you can adopt today with concrete tools, verification steps, and small-business scenarios to reduce risk and pass audits.

Why media sanitization matters (risk overview)

Failing to sanitize media before disposal or reuse creates a direct risk of unauthorized disclosure of FCI, which can lead to contract noncompliance, lost contracts, reputational damage, and potential regulatory or contractual penalties; beyond compliance, leftover data on decommissioned laptops, USB drives, printers, or cloud snapshots is a frequent source of breaches and FOIA exposure. For small businesses—where one laptop can contain years of project data—the risk is magnified because staff turnover and limited IT resources increase the chance of improper disposal.

Step-by-step sanitization process (practical implementation)

Start with a defined lifecycle process: (1) Inventory and classify media with a unique asset tag and record whether it stores FCI; (2) Determine sanitization level using NIST SP 800-88 Rev. 1 guidance categories—Clear (logical sanitization), Purge (physical/crypto), or Destroy (physical destruction) based on media type and reuse risk; (3) Select a method and tool appropriate to the media (examples below); (4) Execute sanitization in a controlled environment following a written procedure and chain-of-custody; (5) Verify and log results, retain proof (screenshots, hashes, certificates of destruction); (6) Approve reissue or disposal and store records for audit retention periods defined in your contract or internal policy.

Selecting methods and tools (technical specifics)

Use method-to-media mapping: for magnetic HDDs used internally, a DoD-style overwrite or single overwrite with a vetted tool (like sdelete -z for Windows or shred for Linux) or full-disk wipe is acceptable for Clear when reuse is planned; for SSDs and NVMe devices, do not rely on multiple overwrite passes—use firmware-based secure erase (hdparm --security-erase or NVMe sanitize/format commands) or crypto-erase where the drive is encrypted and the encryption keys are securely destroyed. For removable flash (thumb drives, SD cards), prefer physical destruction or vendor-provided secure wipe; for mobile devices, ensure device encryption is enabled and perform a factory reset plus remote wipe verification; for printers, MFPs, and copiers, request internal disk sanitization from the manufacturer or a certified vendor and obtain a certificate of destruction. When you cannot sanitize effectively, physically destroy media (shredding, crushing, incineration) through a certified vendor and obtain a certificate of destruction with serial numbers/asset tags.

Verification, logging, and chain-of-custody

Verification is essential for auditability: record pre-sanitization screenshots of filesystem listings, log the tool and command used, capture hashes of wiped volumes where appropriate, and collect a signed certificate of destruction for physical disposals. Maintain a chain-of-custody form with fields: asset tag, serial number, media type, owner, sanitization method, operator, start/end timestamps, verification artifact references, and disposition decision (reuse/scrap/vendor). Retain logs and certificates per contract or organizational policy (commonly at least 3–6 years for federal contracting records).

Real-world small business scenarios

Scenario A: A 12-person contracting shop rotating 10 laptops out of service. They enforce BitLocker full-disk encryption with key escrow in a central KMS; to retire a laptop they perform a crypto-erase by deleting the escrowed keys and then run the vendor secure-erase utility for SSDs. They log the serial numbers and key deletion confirmation and physically destroy only the few drives that fail secure-erase. Scenario B: A small engineering firm replacing external drives received during a subcontract—these drives are classified FCI. They use a certified media destruction vendor to shred the drives, retain the certificate of destruction, and update asset inventory. Scenario C: A contractor working with removable media (USB sticks)—they prohibit personal use, provide company-issued encrypted drives, and require that any returned drive is physically destroyed rather than reused.

Compliance tips and best practices

Integrate sanitization into procurement and retirement workflows so assets are tagged at acquisition and tracked until disposition. Use encryption at rest (BitLocker, FileVault, LUKS) as a mitigating control—crypto-erase is often the fastest, lowest-cost disposal method when keys can be securely destroyed. Create a short, plain-language procedure for staff and train anyone who handles end-of-life media. For outsourced destruction, include sanitization and certificate-of-destruction clauses in vendor contracts and verify vendor certifications (NAID, ISO 14001 where applicable). Periodically test your process by selecting a random sample of sanitized devices and performing forensic checks to validate your controls.

Implementation checklist (quick actionable items)

Checklist: 1) Build an asset register and tag all media that may contain FCI; 2) Define sanitization policy mapping media types to Clear/Purge/Destroy; 3) Select approved tools and vendors (list commands and procedures in your SOP); 4) Require verification artifacts and certificates of destruction; 5) Train personnel and enforce chain-of-custody; 6) Maintain retention of proof for audits. Example SOP snippet: "For SSD/NVMe: attempt firmware secure-erase; if unsuccessful, engage approved destruction vendor and obtain certificate with serial number." Include that small businesses can often combine full-disk encryption + key destruction to minimize costs and complexity.

In summary, a defensible media sanitization program for FAR 52.204-21 / CMMC 2.0 Level 1 requires an asset-centric lifecycle, NIST-aligned sanitization choices, clear technical procedures for HDD/SSD/mobile/removable media, verification and logging, and contractual controls for vendors; following the step-by-step process above will reduce risk, simplify audits, and ensure FCI is not exposed during disposal or reuse.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes