🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize Hard Drives and SSDs to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII: NIST SP 800-88 Implementation Steps

Step-by-step guidance to sanitize HDDs and SSDs in line with FAR 52.204-21 and CMMC 2.0 Level 1 using NIST SP 800-88's Clear/Purge/Destroy model.

•
April 07, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing storage media correctly is a practical, auditable control required by FAR 52.204-21 and CMMC 2.0 Level 1; this post maps NIST SP 800-88's Clear, Purge, and Destroy guidance into concrete implementation steps for small businesses operating under the Compliance Framework so you can safely reuse, transfer, or dispose of hard drives and SSDs without risking exposure of Controlled Unclassified Information (CUI).

Understand NIST SP 800-88: Clear, Purge, Destroy

NIST SP 800-88 defines three outcomes: Clear (logical techniques that make data infeasible to recover using normal system functions), Purge (more robust techniques to protect against complex recovery methods), and Destroy (physical destruction so recovery is impossible). For compliance under FAR/CMMC Level 1, you must select a method appropriate to the media type (HDD vs SSD), the sensitivity of the data (CUI or not), and the disposition purpose (reuse in-house, redeploy to another party, or disposal).

Step 1 — Inventory and Classification (Compliance Framework specifics)

Begin with an inventory tied to your Configuration Management database: record device type, make/model, serial number, storage capacity, installed encryption (SED or software FDE), and whether it contains CUI. Tag each device with disposition intent: reuse internally, transfer to third party, or final disposal. This classification determines whether Clear, Purge, or Destroy is required under your Compliance Framework policies.

Step 2 — Choose the correct sanitization method

Map the media and disposition to NIST outcomes: for HDDs intended for reuse in low-risk contexts, a Clear (single overwrite) or Purge (multiple overwrites or degaussing) may suffice; for drives containing CUI or being released to an external party, prefer Purge or Destroy. For SSDs, because of wear-leveling and over-provisioning, overwriting is unreliable — NIST recommends Purge (cryptographic erase or vendor firmware sanitize) or physical Destroy if you cannot execute/verify a purge.

Technical options — HDDs

HDDs: common purge methods include a verified multiple-pass overwrite (though modern NIST guidance indicates one pass with a verifiable pattern is often adequate) or degaussing for magnetic media if you will not reuse the drive. Tools: certified commercial erasure products (Blancco, WhiteCanyon) provide audit reports acceptable for FAR/CMMC evidence; open-source tools (e.g., secure-delete family or dd with patterns) can be used for Clear when combined with verification, but verify tool acceptance in procurement rules before relying on free tools for compliance reporting.

Technical options — SSDs

SSDs: use vendor-provided secure-erase utilities (Samsung Magician, Intel SSD Toolbox) or drive-native commands where supported (ATA Secure Erase via hdparm for SATA, NVMe Secure/Sanitize via nvme-cli for NVMe devices), or perform cryptographic erase if the device is a Self-Encrypting Drive (SED) by deleting or replacing the encryption key. Avoid relying on HDD-style multi-pass overwrites; if a vendor sanitize is unavailable or verification fails, move to physical destruction (shredding or crushing) to meet Purge/Destroy requirements.

Step 3 — Execute, verify, and document

Execute sanitization according to your SOPs, and always capture evidence: serial number, drive model, operator identity, timestamp, method used, tool name and version, and verification result. For vendor or commercial tools, retain the sanitized certificate/report. For manual methods, run post-wipe verification: attempt to re-mount, inspect partition tables, and when feasible perform a forensic read (Autopsy or other tools) to confirm absence of recoverable files; for SED crypto-erase, document key destruction or the Secure Erase command response. Store records per contract retention requirements to show compliance during audits.

Real-world small-business scenarios

Scenario A — Decommissioning laptops with CUI for resale: Inventory and backup, enable or confirm full-disk encryption in advance, use the vendor's factory secure-erase tool (or ATA Secure Erase) to purge, then verify by booting to a clean build and confirming no user data present; retain the tool's certificate or an operator-signed detachment form. Scenario B — Upgrading SSDs for internal reuse: if drives are SEDs, perform a crypto-erase (delete the encryption key) to meet Purge with minimal wear; log the crypto-erase event and re-encrypt or re-provision before reuse. Scenario C — Failed drives that will not boot: treat as potentially compromised CUI; document the failure, isolate the device, and perform physical destruction with a certified vendor that provides a destruction certificate.

Compliance tips and best practices

Practical controls that reduce sanitization burden: (1) enable full-disk encryption from procurement to make crypto-erase your default purge method, (2) maintain a validated list of approved sanitization tools and vendor utilities, (3) implement SOPs and train staff on sanitization and chain-of-custody procedures, (4) use a trusted destruction vendor that issues certificates and meets environmental and contract requirements, and (5) schedule periodic audits and spot-checks — e.g., randomly verify 5% of sanitized drives quarterly to ensure process integrity.

Risks of not implementing proper sanitization

Failure to sanitize properly risks inadvertent disclosure of CUI, loss of government contracts, penalties under FAR, reputational damage, and potential incident response costs. A realistic example: a disposed SSD not properly purged is purchased on secondary markets and forensically recovered; the small business is then subject to an audit that finds inadequate processes, leading to corrective action plans, potential contract suspension, and expensive remediation.

Summary: implement a clear NIST SP 800-88-based workflow within your Compliance Framework — inventory and classify media, choose Clear/Purge/Destroy appropriately, use vendor-provided/approved tools (or certified commercial erasure tools) for execution, verify results, and retain auditable records; favor full-disk encryption and crypto-erase for SSDs, and when in doubt or when verification fails, opt for physical destruction with a certificate to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 evidence requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes