🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use 7 Practical Methods to Sanitize or Destroy Media Containing Federal Contract Information — Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Practical, actionable guidance on 7 proven methods to sanitize or destroy media holding Federal Contract Information to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

April 09, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Organizations that handle Federal Contract Information (FCI) must ensure media sanitization or destruction before disposal or release to prevent unauthorized disclosure and to comply with FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII); this post gives seven practical methods, implementation notes for a Compliance Framework, small-business examples, and actionable steps you can adopt immediately.

Seven Practical Methods to Sanitize or Destroy Media

1) Overwrite ("Clear") for magnetic hard drives

For traditional HDDs used in laptops and desktops, overwriting is a common "clear" method: perform a full single-pass overwrite with zeros or a pseudorandom pattern, verify by reading back sectors, and log the operation; NIST SP 800-88 recommends clearing as acceptable for drives that are to remain in the same system or when physical access is retained. Implementation tip for small businesses: add an overwrite step to your decommission SOPs using a standard tool (for Linux: dd if=/dev/zero of=/dev/sdX bs=1M; for Windows, use vendor or certified erasure tools), record device serial number, tool name/version, timestamp, and operator in the asset disposal log.

2) Cryptographic erase (crypto-erase) and self-encrypting drives (SEDs)

If drives or devices use full-disk encryption or are SEDs (OPAL/TCG-compliant), perform a cryptographic erase by securely deleting the encryption key or issuing the device's crypto-erase command; this is fast and effective because without the key the data is not recoverable. For Compliance Framework implementation, maintain an inventory flag for SED-capable assets, keep key management and key-destruct procedures in your policy, and record the key destruction event (who, when, device ID). Example: a small contractor with 20 SED laptops can retire machines by deleting keys via the vendor tool and capturing a certificate of key destruction in the asset record.

3) Hardware secure erase (ATA Secure Erase / NVMe sanitize)

Use built-in drive sanitize/secure-erase commands where supported: ATA Secure Erase (hdparm --security-erase) for SATA SSD/HDD, NVMe sanitize or format with secure-erase flags for NVMe SSDs. These commands are designed to interact with firmware to remove accessible user data; verify firmware compatibility and that the command completes successfully. For small shops, test the vendor/drive combination on a non-production unit, add the specific command sequence to your SOP, and log the completion code; if a drive returns an error, fall back to physical destruction or certified vendor disposal.

4) Degaussing for magnetic media (tape and HDD where applicable)

Degaussing exposes magnetic media to a strong alternating magnetic field to remove remnant magnetic patterns; it's effective for many tapes and some HDDs but will not work on SSDs or on drives with built-in encryption that requires key destruction. Use a degausser rated for the media type and document the machine model, gauss rating, media serial numbers, and operator. Small-business scenario: if you maintain legacy backup tapes with FCI, contract a vendor that provides on-site degaussing and a certificate of destruction to satisfy FAR/CMMC evidence requirements.

5) Physical destruction (shredding, crushing, pulverizing)

Physical destruction is the most straightforward method for mixed media and when other methods are infeasible or untrusted: shredding drives, crushing platters, pulverizing SSDs, and shredding paper are acceptable. Use a NAID/R2-certified vendor or an in-house shredder rated for electronics; retain Certificates of Destruction (CoD) and chain-of-custody records. Practical detail: SSDs may require disintegrating/pulverizing rather than simple cutting because chips can retain data; specify acceptable destruction methods in your disposal policy.

6) Factory reset plus verification for mobile devices and IoT

For phones, tablets, and IoT devices, perform a factory reset and then verify that user data and accounts have been removed; where possible, combine with device-level encryption and crypto-erase. Use MDM (mobile device management) to issue remote wipes, remove device enrollment, and confirm wipe logs. Small-business example: before recycling 10 corporate phones, the IT admin individually removes MDM enrollments, runs the OS factory reset, and uses a verification checklist to confirm the device boots to the initial setup screen and is not linked to the company account.

7) Certified disposal services and chain-of-custody documentation

When in doubt or when disposals are frequent, engage certified e-waste and media destruction vendors (NAID AAA, R2, e-Stewards) that provide on-site services and CoDs; maintain a disposition ledger including asset IDs, serial numbers, method used, vendor, date/time, and operator. For Compliance Framework evidence, collect the vendor's certificate, chain-of-custody forms, and ingest them into your compliance evidence repository for audits and self-assessments.

Practical Implementation Notes, Risks, and Compliance Tips

Implement these methods within your Compliance Framework by: (1) classifying media that contains FCI in your asset inventory, (2) defining a media sanitization SOP that maps media types to allowed methods (clear/purge/destroy), (3) training operators and maintaining logs and certificates, and (4) performing periodic verification sampling (for example, forensic validation on a small percentage of sanitized drives). Technical details: track drive models and firmware to know whether ATA secure-erase, NVMe sanitize, or crypto-erase is supported; log tool names/versions and return codes (e.g., hdparm status or vendor utility reports). Risks of not implementing include exposure of FCI via improper disposal leading to breaches, contractual penalties under FAR, failure during a CMMC assessment, reputational damage, and potential loss of government contracts. Best practices: include sanitization steps in offboarding checklists, automate inventory and disposition records in your CMDB, and require proof-of-destruction for all outsourced disposals; small businesses should budget for periodic third-party destruction to avoid DIY gaps.

Summary

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 (MP.L1-B.1.VII) is achievable by adopting one or more of these seven methods—overwrite, crypto-erase, hardware secure erase, degaussing, physical destruction, factory reset verification, and certified disposal—and embedding them into a documented Compliance Framework with SOPs, training, inventory records, and evidence collection; do the upfront work (device capability inventory, SOPs, vendor selection, and logging) and you will reduce risk, pass assessments more easily, and protect FCI from accidental disclosure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes