🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Perform Secure Media Sanitization and Destruction for FCI: Tools, Techniques, and Checklist — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Step‑by‑step guidance to securely sanitize and destroy media holding Federal Contract Information (FCI) to meet FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII).

April 19, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small businesses and contractors can implement secure media sanitization and destruction to protect Federal Contract Information (FCI) and meet FAR 52.204-21 and CMMC 2.0 Level 1 practice MP.L1-B.1.VII — including practical steps, recommended tools, technical details, a ready checklist, and real-world examples you can start using today.

Mapping the requirement to real controls

FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.V.II / MP.L1-B.1.VII depending on labeling) require that FCI is protected while in use and properly sanitized or destroyed before disposal or reuse. Practically this means your organization must: identify media that may contain FCI, select an appropriate sanitization method (clear, purge, destroy) based on media type, perform and verify sanitization, and document the entire process so auditors can demonstrate compliance.

Practical implementation steps for Compliance Framework

Start by creating or updating a Media Sanitization Policy scoped to Compliance Framework obligations: (1) inventory all storage media and label which items may contain FCI; (2) classify media by type (HDD, SSD, USB, mobile, optical, backup tape, virtual storage); (3) map each type to an approved sanitization method (per NIST SP 800-88 Rev.1 guidance); (4) implement tools and procedures; (5) verify and log each sanitization or destruction event; and (6) retain certificates of destruction and update asset records. These steps produce auditable evidence aligned with FAR and CMMC requirements.

Sanitization methods and recommended tools

Use the NIST SP 800-88 model: Clearing (logical overwrites or crypto-erase) for reusable media where overwriting is effective; Purging (crypto erase, degaussing, or vendor secure erase) for media that requires stronger measures; and Physical Destruction (shredding, crushing, incineration) when media will be discarded. Practical tool examples: for overwritable HDDs use 'hdparm' with ATA Secure Erase or enterprise tools like Blancco; for SSD/NVMe prefer vendor secure-erase, NVMe Format with secure sanitize, or crypto-erase (e.g., BitLocker key destruction) rather than multi-pass overwrites; avoid DBAN for SSDs. For mobile devices use full-disk encryption and MDM remote wipe + factory reset and then physical destruction if high risk. For cloud/VMs follow provider documented snapshot/volume deletion and key destruction procedures (e.g., AWS EBS: detach, delete snapshots, and delete KMS keys). Always verify manufacturer-recommended secure-erase procedures; example Linux ATA flow: set a temporary password then run hdparm --security-erase PASS /dev/sdX (use vendor docs first). For NVMe, use vendor-recommended nvme-cli secure sanitization or the drive's built-in sanitize commands rather than generic overwrites.

Verification, documentation and chain of custody

Verification is mandatory for compliance evidence: capture tool output, time stamps, asset IDs, operator identity, and media serial numbers. Use printed or digital Certificates of Destruction (CoD) from NAID-certified vendors for physical destruction, retain secure-erase logs for electronic sanitization, and store logs in a centralized, access-controlled location. Implement a simple chain-of-custody form for media movements (who handled it, when, where it went). Periodically test verification by sampling sanitized media and attempting data recovery (or using third-party verification services) to ensure procedures are effective.

Small-business scenarios and real-world examples

Example 1 — Laptop return: a subcontractor returns a laptop containing FCI. Process: inventory the device, image and retain a hashed inventory snapshot for records, encrypt then crypto-erase BitLocker keys, invoke vendor secure-erase, verify with logs, and if not reusable, send to NAID-certified vendor for shredding and obtain CoD. Example 2 — Cloud VM decommission: remove sensitive data, destroy snapshots, delete EBS volumes, rotate and delete KMS keys, and keep cloud audit logs showing the deletes. Example 3 — USB drives in a field office: use a dedicated overwrite tool (or physically destroy if low-cost) and maintain a disposal log signed by two staff members. These workflows are low-cost and scaleable for small businesses while meeting auditor expectations.

Checklist: concrete actions to implement now

  1. Inventory assets and tag media that can hold FCI (serial numbers, model, owner).
  2. Create/assign sanitization method per media type (clear/purge/destroy) using NIST SP 800-88 guidance.
  3. Deploy or contract trusted tools/vendors (hdparm/ATA secure-erase, nvme-cli/vendor sanitize, Blancco for certification, NAID physical destruction vendors).
  4. Perform sanitization, capture logs/console output, and collect CoDs for physical destruction.
  5. Verify by sampling and documented validation checks; keep sanitized media logs for retention period required by contract.
  6. Train staff, maintain chain-of-custody forms, and include sanitization requirements in procurement and disposal contracts.

Compliance tips, best practices and common pitfalls

Best practices: encrypt all devices at procurement — full-disk encryption reduces risk and enables faster crypto-erase options; maintain asset-tagging and a disposal schedule; use NAID-certified vendors for off-site destruction; include sanitization acceptance criteria in procurement contracts; and automate logging where possible (SIEM/cloud audit logs). Pitfalls to avoid: relying on single-pass overwrites for modern SSDs, failing to delete keys in cloud KMS, not documenting actions, and mixing sanitized media back into production without verification. Make sanitization part of your Change Management and Offboarding processes so no media falls through the cracks.

Risks of not implementing sanitization and final summary

Failure to sanitize or destroy media properly exposes FCI to data breaches, contract violations, government penalties, lost future contracts, reputational damage, and potential legal liability. For small businesses this can be existential; a single incident may cost more than implementing a basic sanitization program. Summary: adopt a clear policy mapped to FAR 52.204-21 / CMMC MP.L1-B.1.VII, inventory and classify media, use appropriate NIST-aligned methods and vetted tools, verify and document each action, and involve NAID-certified vendors for physical destruction. Following these actionable steps will minimize risk and produce the auditable evidence required by auditors and prime contractors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes