🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Media Sanitization for Common Devices (HDDs, SSDs, USBs, Mobile) Containing Federal Contract Information Before Reuse or Disposal — Device-Specific Steps for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Step-by-step, device-specific media sanitization guidance to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements for HDDs, SSDs, USBs, and mobile devices.

April 09, 2026
6 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing media that has held Federal Contract Information (FCI) is a mandatory control under FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII — and for small businesses this is also a practical risk-mitigation step: if you don't sanitize properly, you can leak FCI, lose contracts, and face significant reputation and financial damage. This post gives you device-specific, actionable steps (HDDs, SSDs, USBs, and mobile devices), technical examples, and operational best practices to implement an auditable sanitization program that maps to Compliance Framework expectations and NIST SP 800-88 Rev. 1 guidance.

Compliance context and high-level approach

FAR 52.204-21 requires contractors to protect covered contractor information systems and CMMC Level 1 MP.L1-B.1.V.II (and related MP controls) require sanitization of media prior to reuse or disposal. The accepted framework for sanitization is NIST SP 800-88 Rev. 1, which categorizes sanitization actions as Clear (logical techniques), Purge (more robust hardware/firmware techniques), and Destroy (physical destruction). Your compliance program should define which action is required by media type and the sensitivity of the FCI, implement device-specific procedures, record evidence, and verify effectiveness through spot checks or vendor certificates.

Device-specific sanitization steps (practical, actionable)

HDDs (spinning hard drives)

Recommended actions: Purge via secure erase (firmware/ATA) or overwrite (Clear) when you intend reuse; Destroy (shred/crush) for disposal if you cannot guarantee purge. Practical steps: (1) Identify the drive by serial/asset tag and record in an asset log. (2) If reuse is intended, attempt an ATA Secure Erase: set a temporary password and run hdparm --user-master u --security-erase PWD /dev/sdX (run as root and follow vendor docs). (3) If ATA secure erase isn't available, perform a full overwrite using shred -n 3 -z /dev/sdX or dd if=/dev/zero of=/dev/sdX bs=1M status=progress (note: multiple passes may be used but are less necessary for modern drives if you use a firmware secure erase). (4) Verify: check that the partition table and MBR are gone and optionally run a forensic recovery tool on a sample to confirm no recoverable files. (5) Record operator name, command used, date/time, device serial, and verification result in the sanitization log.

SSDs and NVMe (solid-state drives)

Because wear-leveling and over-provisioning can leave data remnants, overwriting is unreliable for SSDs. Follow NIST guidance: prefer Purge via vendor/firmware Secure Erase or cryptographic erase. Practical steps: (1) Use vendor utilities (e.g., Samsung Magician, Intel SSD Toolbox) or firmware-level ATA Secure Erase / NVMe Secure Erase operations; for NVMe use the vendor-recommended nvme-cli operations (consult vendor docs for exact flags). (2) If the drive supports encryption (self-encrypting drives or full-disk encryption implemented at provisioning), perform cryptographic erase by securely deleting the encryption key (key destruction) — this is fast and effective. Example: for LUKS-encrypted Linux systems, remove the keyslots and shred the key material; for BitLocker, use manage-bde to delete protectors and clear keys before wiping. (3) If vendor sanitize commands are used, retain any manufacturer-provided erase certificate or log output as evidence. (4) If reuse is not required or sanitize options are unavailable, physically destroy the SSD.

USB flash drives and external media

USB media is inexpensive and commonly reused; treat it like small SSDs. For reuse: (1) If encrypted, perform cryptographic erase by deleting keys (or re-encrypt with a new key and then securely destroy the old key). (2) If not encrypted, perform a full overwrite: use shred -n 3 -z /dev/sdX or a filesystem-aware tool to write zeros across the raw device. (3) For high-assurance sanitization, use DoD-style multi-pass overwrites only when required by policy, but prefer cryptographic erase and physical destruction for final disposal. (4) Log device serial (if present), asset tag, method, operator, and date. For small businesses that reuse USBs frequently (for example, to transfer backups), enforce encryption by default (VeraCrypt, BitLocker To Go) so disposal can be handled with key destruction rather than repeated overwrites.

Mobile devices (smartphones and tablets)

Mobile devices have integrated storage and numerous persistent backups (cloud, SIM, SD). Steps: (1) Remove external media (SIM, microSD) and treat separately. (2) Ensure device encryption is enabled before data is stored; modern iOS and recent Android versions enable full-disk encryption by default. (3) Perform a factory "Erase All Content and Settings" (iOS) or a secure factory reset after confirming the device is encrypted — the factory reset combined with encryption provides effective crypto-erase in most modern devices. (4) For Android, confirm that the device's user data partition was encrypted; if not, enable device encryption then do a factory reset, or perform device-specific secure wipe using vendor tools. (5) For device reuse or turnover, remove all accounts, perform a reset, and verify by booting to initial setup screen. (6) For disposal, if you cannot guarantee the reset, physically destroy the storage (crush or shred) or obtain a certified destruction service.

Verification, documentation, and operational tips

A documented process and evidence trail are essential for audits. Your sanitization SOP should include: asset inventory lookup (serial, model), decision matrix (Clear/Purge/Destroy based on media & FCI sensitivity), step-by-step command examples, operator initials, date/time, and method output or vendor erase certificates. Practical automation: integrate sanitization tasks into your IT asset management system so a device moves through statuses (Active → Retire → Quarantine → Sanitized → Reuse/Destroy). For third-party destruction, require a Certificate of Destruction (COD) that references NIST SP 800-88 and retain CODs for the contract retention period plus an organizational window (commonly 3–7 years). Perform periodic spot checks using forensic tools (Autopsy, bulk_extractor) on a sample of sanitized media to validate processes.

Risks of not implementing proper sanitization

Inadequate sanitization risks leakage of FCI, unauthorized disclosures, contract non-compliance, and potential penalties under FAR. Real-world consequences include loss of a contract, mandatory reporting to contracting officers, reputational damage, and downstream liabilities if compromised data leads to broader incidents. For a small business, a single data leak from a reused laptop or employee phone can end a relationship with a federal prime and jeopardize future opportunities. Operationally, it also increases forensic and incident-response costs if a device with residual data is lost or stolen.

Small-business scenarios and practical examples

Example 1: A 12-person engineering firm replaces laptops. Practical path: enable full-disk encryption on day one, when retiring a laptop remove it to a quarantine shelf, perform vendor secure erase (or cryptographic key destruction), capture the hdparm/nvme-cli output and save it to the asset record, and then redeploy. Example 2: A consultant's firm hands out USB drives for field work. Enforce BitLocker To Go on all issued USBs; when a contractor leaves, retire the USB and perform key destruction rather than repeated overwrites. Example 3: A small legal shop rotating smartphones: enable device encryption and MDM with remote wipe, on turnover perform a supervised factory reset and maintain a turnover checklist signed by IT and the departing employee.

Summary: Meet FAR 52.204-21 and CMMC 2.0 MP.L1-B.1.VII by adopting a documented, device-specific sanitization program based on NIST SP 800-88: classify required action (Clear, Purge, Destroy), use firmware/vendor secure erase or cryptographic key destruction where appropriate, log and retain evidence, and verify periodically. For small businesses the best practical controls are: encrypt all FCI at rest from day one, maintain an asset and sanitization log, use vendor secure-erase tools or cryptographic erase for SSDs and mobile devices, physically destroy media when in doubt, and require CODs from destruction vendors — these steps minimize risk and create a defensible compliance posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes