🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize Hard Drives and SSDs Containing Federal Contract Information to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, step-by-step guidance for sanitizing HDDs and SSDs that contain Federal Contract Information to meet FAR 52.204-21 and CMMC 2.0 Level 1 media protection requirements.

•
April 07, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing storage media that once contained Federal Contract Information (FCI) is a small business’s must-do task under FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII): this post provides practical steps, technical options, policy language, and real-world examples so you can implement defensible sanitization for both hard disk drives (HDDs) and solid-state drives (SSDs).

Why sanitization matters for FAR 52.204-21 and CMMC 2.0 Level 1

FAR 52.204-21 requires contractors to safeguard FCI and ensure it is not exposed when media are retired, reused, or disposed. CMMC 2.0 Level 1 similarly expects media protection controls that include sanitization. For small businesses working on federal contracts, failing to sanitize media risks data leakage, contract non‑performance, lost business, and reputational and financial harm if FCI is recovered from disposed drives.

Establish a practical sanitization policy (Compliance Framework-specific)

A minimal, auditable policy should be part of your Compliance Framework: inventory all storage media (asset tag, owner, device type, serial number, storage location), classify whether media ever contained FCI, define sanitization methods per media type (HDD, SSD, removable flash), assign roles for execution and verification, and require documentation (date, method, operator, verification evidence, certificate of destruction or photo). Example policy language: "All storage media that stored FCI shall be sanitized before reuse or disposition in accordance with NIST SP 800-88 Rev.1: Clear, Purge, or Destroy; SSDs shall be purged by vendor secure erase or physically destroyed if purge cannot be verified."

Technical implementation options — HDDs vs SSDs

HDDs (magnetic platters): acceptable methods include overwriting (Clear) or degaussing (Purge) followed by physical destruction if necessary. Overwriting tools such as DBAN or the Linux 'shred' command can be used for single-drive wipes, but record the method and verification. SSDs (NAND flash): overwriting is unreliable because of wear-leveling and remapping; preferred approaches are (1) vendor/firmware secure erase (ATA Secure Erase / NVMe sanitize), (2) cryptographic erase (destroying encryption keys if full-disk encryption was in use), or (3) physical destruction (shredding, crushing, incineration) if you cannot reliably purge.

Concrete technical examples (small-business context)

Example 1 — Decommissioning a laptop HDD: remove the drive, bitwise overwrite with a verified tool, e.g., on Linux a vetted image-writer or disk utility; record the pass, write a verification hash, and retain logs. Example 2 — NVMe SSD from a development workstation: use the drive/vendor utility or 'nvme-cli' to issue a secure sanitize/format command as documented by the manufacturer (test on non-production hardware first). Example 3 — Drives encrypted with BitLocker or LUKS: if the entire drive has been encrypted with a validated full-disk encryption solution and keys are managed securely, cryptographic erasure (delete/zero the encryption key and backup key copies) is often acceptable and fast—document key destruction steps and evidence.

Example commands (use with extreme caution; always test & follow vendor docs)

These are illustrative; run only after backups, on correct devices, and with vendor guidance. For ATA drives: set a temporary password then invoke secure erase, e.g., 'hdparm --user-master u --security-set-pass NULL /dev/sdX' followed by 'hdparm --security-erase NULL /dev/sdX'. For NVMe drives, use nvme-cli (examples vary by firmware): 'nvme format /dev/nvme0n1 -s 1' to invoke a sanitize operation — confirm '-s' semantics with your firmware. If using FDE, remove keys (e.g., manage BitLocker keys in AD/MBAM or use 'cryptsetup luksKillSlot' for LUKS) rather than attempting multiple overwrites. NOTE: incorrect use of these commands can render drives unusable or fail to sanitize; always consult vendor documentation and log every action.

Operational steps and chain-of-custody

Implement a consistent process: (1) identify media and whether it has held FCI, (2) choose method appropriate to media type, (3) perform sanitization in a controlled environment, (4) verify success (tool logs, hash mismatches, vendor confirmation), (5) record evidence (sanitization record / certificate, photos, serial numbers), (6) transfer to disposal or reuse. For outsourced destruction, use certified vendors (NAID AAA-certified or equivalent) and retain Certificates of Destruction (CoD). Small businesses can use mobile on-site shredding events or a trusted vendor with secure transport and chain-of-custody forms.

Risks if you skip or shortcut sanitization

Failure to properly sanitize media can result in unintended disclosure of FCI via simple forensic recovery. This can cause contract violations, loss of future contracts, audits, financial penalties, and reputational damage. From a cybersecurity perspective, residual data on reused drives can serve as an easy foothold for threat actors. Legally and contractually, you may be subject to corrective actions under FAR and potential suspension or debarment for repeated or significant non‑compliance.

Best practices and compliance tips

1) Inventory and tag: track every drive with serial numbers and status (sanitized, pending, destroyed). 2) Use validated methods: follow NIST SP 800-88 Rev.1 guidance and vendor firmware instructions. 3) Prefer full-disk encryption in production—cryptographic erasure simplifies disposal if keys are controlled. 4) Train staff and require two-person verification for sanitization operations. 5) Keep records for the life of the contract plus any retention period required by the contracting officer. 6) When in doubt, physically destroy SSDs that cannot be proven purged. 7) Include sanitization requirements in subcontractor and disposal vendor contracts.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII for media sanitization is achievable for small businesses through a documented policy, media inventory, the right technical methods per media type (secure erase for HDD/SSD where supported, cryptographic erasure when full-disk encryption is used, and physical destruction when necessary), and defensible evidence (logs, CoDs, and chain-of-custody). Implement these steps as part of your Compliance Framework, train staff, and retain records to demonstrate compliance during audits or contract review.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes