🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Sanitize vs Destroy Electronic Media Containing FCI: Practical Methods to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, technical guidance for small businesses to sanitize or destroy electronic media that contain Federal Contract Information (FCI) to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 19, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

When your small business handles Federal Contract Information (FCI) you must ensure media sanitization or destruction is performed reliably so the data cannot be reconstructed—this post outlines clear, practical methods mapped to FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII), explains the difference between “sanitize” and “destroy,” and gives step-by-step procedures, tools, and evidence you can implement right away.

Sanitize vs Destroy: definitions and when to use each

Under NIST SP 800-88 terminology (commonly accepted in compliance frameworks), “clear” is a logical sanitization (software overwrite or built-in erase), “purge” is a stronger sanitization (degauss or cryptographic erase), and “destroy” is physical destruction rendering the media unrecoverable. For FAR 52.204-21 and CMMC Level 1 MP.L1-B.1.VII, sanitize is acceptable when media will remain in circulation (reassignment, resale, reuse) and destruction is required when media cannot be guaranteed sanitized or is end-of-life and contains FCI that cannot be retained.

Practical implementation steps for Compliance Framework

1) Inventory and classify: Create an auditable inventory of all media types that may contain FCI (laptops, HDDs, SSDs, USB drives, backup tapes, mobile devices, SD cards, removable HDD enclosures). Tag each item with owner, storage location, and classification (contains FCI: yes/no). 2) Policy & SOP: Publish a short Media Sanitization & Destruction SOP that maps media types to allowed methods (clear/purge/destroy), assigns roles, and specifies evidence retention. 3) Protect by design: Use full-disk encryption (FDE) on all endpoints that store FCI—this lets you use cryptographic erase as a fast purge method when appropriate.

Sanitization methods, by media type (technical specifics)

Hard Disk Drives (HDDs): For magnetic HDDs, approved purge methods include degaussing (proper-rated degauss device with documented field strength) followed by physical destruction, or multiple-pass overwrites using certified erasure tools. SSDs and eMMC/NVMe: Do NOT rely on multi-pass overwrites—use vendor “secure erase” (ATA Secure Erase via hdparm: set security password then issue --security-erase to the device), NVMe sanitize/format commands (nvme-cli sanitize or nvme format with sanitize options), or cryptographic erase (destroy the encryption key managed by your KMS). USB flash drives: prefer full-drive encryption and then crypto-erase, or destroy the device physically if encryption wasn’t used. Tapes: follow vendor purge/destroy guidance; degaussing followed by shredding is common.

Physical destruction techniques and controls

When destruction is required, use methods appropriate to media construction: shredding (particle size conforms to NAID/DoD guidance where applicable), crushing/disintegration for SSDs and HDD platters, or incineration. Note: degaussing is effective only against magnetic media (HDDs, magnetic tapes) and is ineffective for SSDs. Work with certified vendors (NAID AAA certified) and obtain Certificates of Destruction (CoD) and chain-of-custody documentation. Retain CoDs in your compliance file with asset tags.

Small-business scenario examples

Example 1: A 20-person contractor uses 10 laptops with FDE (BitLocker). When a laptop reaches EOL, your SOP calls for crypto-erase by revoking BitLocker keys in your key management system and performing a factory reset; document the key revocation timestamp and inventory change. Example 2: A desktop with a non-SSD HDD used to store proposal materials: IT runs a certified erasure tool (e.g., Blancco or open-source with validated logs), verifies the erasure log, then resells the machine; retain the erasure report in the disposition record. Example 3: Small field office with legacy backup tapes: arrange certified degauss + shred through a NAID-certified vendor, receive CoD and add to contract compliance folder.

Compliance tips, evidence, and best practices

• Always document every sanitization or destruction operation: asset ID, serial, method used, operator, date/time, verification steps, and artifact (log or Certificate of Destruction). • Prefer cryptographic protections (FDE) from day one—crypto-erase simplifies purge and speeds compliant disposition. • Test your tools on sample media and preserve verification evidence (screenshots, logs). • Use vendor utilities for SSDs and modern NVMe devices instead of DBAN—DBAN is ineffective on many SSDs. • Use a separation of duties: someone other than the person who performs the erase should verify and sign off on the record.

Risk of non-implementation

Failing to properly sanitize or destroy media containing FCI risks data exposure, contract violations under FAR 52.204-21, and failing CMMC assessment for Level 1 controls—consequences include contract termination, loss of future contracting opportunities, regulatory fines, and reputational damage. Technically, improperly erased SSDs or reused drives can allow recovery of sensitive FCI using forensic tools, leading to disclosure to adversaries.

Implementation checklist and quick SOP outline

Checklist: 1) Inventory all media and tag assets; 2) Confirm encryption status; 3) Map each asset to allowed disposition (clear/purge/destroy); 4) Execute sanitization with vendor tools or perform physical destruction via certified vendor; 5) Collect and store verification evidence (erasure logs/CoD); 6) Update inventory to “disposed” with disposal evidence. SOP outline: Purpose, Scope (FCI contexts), Roles (owner, IT, compliance), Methods by media, Verification & Evidence, Vendor requirements, Retention period for records (recommend 3–6 years unless contract states otherwise).

Summary: To comply with FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII, implement a simple but enforceable media sanitization/destruction program: inventory media, prefer encryption, select validated sanitization or destruction methods per media type (use vendor secure-erase, cryptographic erase, degaussing where appropriate, and physical destruction for SSDs), document every action, and use certified vendors for off-site destruction. These practical steps reduce forensic recovery risk, create the audit trail assessors expect, and protect your small business’s ability to win and sustain federal contracts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes