🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.3

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.3

January 06, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.3 – Ensure equipment removed for off-site maintenance is sanitized of any “Controlled Unclassified Information” (CUI).

Understanding the Requirement

This control requires that any equipment you send off-site for maintenance — laptops, desktops, removable drives or other storage media — is cleared of Controlled Unclassified Information before leaving your control. As an objective, it specifically demands that equipment removed from organizational spaces for off-site maintenance be sanitized of any CUI. Under NIST SP 800-171 REV.2 / CMMC 2.0 Level 2, the focus is preventing data exposure when devices are beyond your physical and administrative protections.

Technical Implementation

  • Establish a written policy and workflow: Define which devices may go off-site for maintenance, who approves the request, and what sanitization steps are mandatory (remove drive, secure wipe, or verified destruction). Assign responsibilities to specific roles (information security lead, system/network administrator, and the staff member requesting maintenance).

  • Prefer hardware removal when practical: If maintenance does not require the original storage, remove the hard drive or SSD and retain it internally. Tag the removed media, log it in inventory, and record chain-of-custody details (who removed it, date, storage location).

  • When removal is not feasible, perform a verified secure wipe: Use an approved sanitization method before sending the device. For compliance with this control, use the DoD 5220.22‑M (three-pass overwrite) or an equivalent certified sanitization tool. Document the tool, method, and verification steps used for each device.

  • Maintain backups and validate restores: Before sanitization, take a full backup of the device (if data retention is required). Store backups encrypted and offline where possible. After maintenance and return of the device (or after replacement), validate data restore procedures with test restores to ensure business continuity and integrity.

  • Vendor agreements and proof of process: Require maintenance vendors to accept contracts specifying they will not access or store CUI and that they will return proof of sanitization if they perform it. If a vendor will perform data handling, require documented procedures and evidence (sanitization logs, certificate of destruction) before reintroducing equipment into your environment.

  • Verification, logging and incident readiness: Maintain a log for all off-site maintenance events capturing device identifiers, serial numbers, who approved the transfer, sanitization method used, and post-maintenance verification results. Train staff on incident reporting if unexpected data exposure is suspected during or after maintenance.

Example in a Small or Medium Business

Your help desk receives a ticket: an employee’s laptop is failing and the manufacturer has requested the device be shipped for board-level repair. The help desk tech follows the company off-site maintenance policy: they create a maintenance approval, back up the user’s data to the secure company backup system, and document the device serial number and owner. The tech removes the SSD from the laptop and keeps it in secured evidence storage; the machine, now without its drive, is packaged and shipped. The SSD is retained internally pending the user’s approval to restore from backup after repair or to provision a replacement drive. When the laptop returns, IT installs a freshly wiped and formatted drive, restores the user’s data from the encrypted backup, and records the full chain-of-custody and sanitization steps in the maintenance log. If the vendor had insisted on repairing the original drive, the company would have required the vendor to provide a certificate of sanitization or destruction before the drive could be reintroduced into the network. Staff involved in the process — the help desk tech, system administrator, and the information security lead — sign off on completion and confirm the device is free of CUI before returning it to the user.

Summary

By combining a clear policy, role assignments, physical removal when possible, documented and verifiable sanitization (e.g., DoD 5220.22‑M), vendor contractual controls, and logging/verification, an SMB can reliably ensure equipment sent off-site is sanitized of CUI. These practical steps reduce risk of uncontrolled exposure and provide the audit trail and evidence needed to demonstrate compliance with the control.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes