🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Verify and Document Media Sanitization for Federal Contract Information Before Reuse or Disposal: Compliance Steps for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - MP.L1-B.1.VII

Step-by-step guidance to verify and document media sanitization of Federal Contract Information to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 control MP.L1-B.1.VII.

•
April 08, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Sanitizing media that contains Federal Contract Information (FCI) before reuse or disposal is a concrete, auditable requirement under FAR 52.204-21 and a CMMC 2.0 Level 1 practice (MP.L1‑B.1.VII); for small businesses this means implementing repeatable procedures, using appropriate technical techniques, and keeping clear evidence that sanitization happened and was verified.

Understand the requirement and scope

Under the Compliance Framework you are responsible for protecting FCI wherever it resides — on laptops, removable media (USB/thumb drives), backup tapes, external HDDs, SSDs, and mobile devices. The control requires that media be sanitized prior to reuse or disposal so that FCI cannot be recovered. Use NIST Special Publication 800‑88 (media sanitization guidance) as the technical baseline and map your organization’s sanitization practice to the Compliance Framework’s media protection taxonomy.

Build an enforceable media sanitization policy and inventory

Create a short written policy that defines roles (e.g., Media Owner, IT Operator, Compliance Officer), acceptable sanitization methods for each media type, verification steps, and required documentation. Maintain an asset inventory that tags media items with asset IDs, serial numbers, media type, last user, and classification (FCI or non-FCI). For a small business this can be a controlled spreadsheet or an entry in your Configuration Management Database; the key is traceability from media to action and record.

Sanitization methods — practical technical guidance

Map each media type to an appropriate sanitization method using the Clear / Purge / Destroy model from NIST 800‑88: logical clear (e.g., overwrite), purge (e.g., cryptographic erase, ATA/NVMe secure erase), or physical destruction when purging is infeasible. Examples: for spinning HDDs, a single-pass overwrite with zeros or a vendor-recommended overwrite tool is usually sufficient; for SSDs, use vendor-supplied secure-erase utilities, NVMe secure erase, or cryptographic erase (if full‑disk encryption was used) because repeated overwrites and tools like DBAN are unreliable for SSDs. For removable flash (USB/thumb drives) prefer secure-erase or physical destruction for low-cost items. For backup tapes, use degaussing or physical shredding, or a certified erase if supported.

Specific technical examples

Practical commands and tools (use test equipment and backups before running on production): use vendor utilities or ATA Secure Erase (e.g., hdparm secure erase) for SATA drives, nvme-cli utilities for NVMe devices (vendor tool recommended for modern NVMe SSDs), and manufacturer secure-erase utilities for USB enclosures. For cryptographic erase: ensure the device used full‑disk encryption (BitLocker, FileVault, LUKS) and then securely destroy the encryption keys (crypto-erase), which effectively renders data inaccessible. Note: procedures vary by vendor and device; document the tool name/version and exact parameters used in your records.

Verification and documentation practices

Verification is as important as the sanitization action. For each sanitized media item collect a verification record that includes: asset tag/serial, media type, sanitization method, tool and version, operator name, date/time, pre-sanitization evidence (optional: hash or inventory), post-sanitization evidence (tool output, screenshot, generated log), and disposal disposition (reuse asset ID, redeployed, transferred, or destroyed). For high-risk items perform a forensic verification step (mount device, run a quick carve using open-source forensics tools, or use a sampling plan). Maintain a signed Sanitization Certificate or Chain-of-Custody form for each batch of media.

Third‑party disposal and vendor considerations

If you use a vendor for destruction or pickup, require proof of certification (e.g., NAID AAA for destruction vendors), a detailed manifest listing serial/asset numbers, and a Certificate of Destruction (CoD). For small businesses it is often acceptable to perform sanitization in‑house if you can demonstrate competency and provide artifacts; otherwise arrange on‑site destruction or witnessed destruction and keep the resulting documentation as contract evidence. Always cross-check vendor CoDs against your inventory to avoid gaps.

Risks of failing to sanitize and document

Failing to sanitize or document sanitization exposes your organization to data breaches, contract compliance violations, termination of contracts, and penalties under FAR clauses. Beyond regulatory risk, a single exposed FCI instance can damage reputation, trigger reporting obligations, and create remediation costs that far exceed the time and expense of a disciplined sanitization process.

In summary: adopt a simple policy that maps media types to approved sanitization techniques, maintain an auditable inventory, use appropriate technical methods (vendor secure-erase, ATA/NVMe secure erase, or cryptographic erase; physically destroy where needed), verify using tool output and sampling, and retain certificates and chain‑of‑custody records. For small businesses these steps are practical, low-cost controls that directly satisfy Compliance Framework expectations for FAR 52.204‑21 and CMMC 2.0 Level 1 MP.L1‑B.1.VII while reducing the risk of FCI exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes