This guide explains, step by step, how to decide between sanitizing and destroying storage devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII requirements, with practical implementation details, verification practices, and small-business examples to help you build auditable processes that reduce risk.
Understand the requirement and the risk
FAR 52.204-21 requires contractors to implement basic safeguarding of covered contractor information systems; CMMC 2.0 Level 1 media protections such as MP.L1-B.1.V.II/VII emphasize safeguarding and controlled disposition of media containing Federal contract information or CUI. The goal for both is to ensure that sensitive data cannot be recovered from storage devices before reuse, transfer, or disposal. Failing to properly sanitize or destroy media risks data exposure, breach reporting obligations, loss of contracts, civil penalties, and reputational harm.
Step 1 — Inventory, classify, and apply risk-based decision rules
Start by inventorying all storage devices (HDDs, SSDs, NVMe, removable media, backup tapes, USB drives, mobile devices) and classifying them by data sensitivity and end-of-life disposition (reuse, transfer to subcontractor, recycle, destroy). Create a simple decision matrix: if the device contains CUI or prolonged retention of Federal contract information, prefer purge or destroy; for non-sensitive public data, clearing may suffice. Include device identifiers (asset tag, serial, model), user assignment, storage type, and last-known contents in the inventory record.
Implementation note (Compliance Framework)
Map the inventory to the Compliance Framework fields (asset owner, classification, disposition reason, control MP.L1-B.1.VII) so you can report status during assessment. Keep the inventory in a version-controlled spreadsheet or an asset-management tool and export proof for audits.
Step 2 — Choose the correct method: Clear, Purge, or Destroy
Follow NIST SP 800-88 Rev.1 guidance: "Clear" (logical deletion overwrites or crypto-erase for reuse within same environment), "Purge" (more robust: crypto-erase, block erase, or secure sanitize commands for devices leaving the environment), and "Destroy" (physical destruction to render media unrecoverable). Choose based on device type: HDDs can often be sanitized with multi-pass overwrite or ATA Secure Erase; SSDs require vendor/firmware-based sanitize commands or cryptographic erasure because overwrite may not reliably remove data due to wear-leveling; tapes and optical media typically need physical destruction or degaussing/secure erase methods appropriate to media technology.
Specific technical details and tools
Examples of technical approaches: for ATA drives, use vendor ATA Secure Erase (hdparm on Linux) or manufacture-provided tools; for NVMe, use nvme-cli sanitize or format-ns commands; for SSDs without a reliable sanitize command, rely on full-disk encryption from deployment (crypto-erase by deleting the encryption key) or physical destruction. Open-source tools like nwipe or shred can be used for HDD clearing in small shops, but verify tool suitability for SSDs first. For enterprise-scale, use certified sanitization solutions and maintain vendor validation documentation.
Step 3 — Implement procedure, logging, verification, and chain of custody
Create a documented procedure that lists: pre-sanitization checks (backups, data retention holds), chosen method, operator name, tool and version, command or equipment ID, date/time, and verification result. Maintain a chain-of-custody record from collection to final disposition. Verification should include both automated logs from the sanitization tool and a human review; for high-risk items, perform random forensic checks (attempt to mount the device, check for recoverable file headers) and record results. Keep records per contract retention requirements—when in doubt, retain sanitization logs for at least the contract term plus 3 years.
Small-business scenarios and examples
Scenario A — Small engineering firm retiring 10 laptops: inventory devices, back up required records, enable full-disk encryption on every laptop in production so you can later perform crypto-erase by securely deleting keys, and when retiring machines use the vendor Secure Erase or physically shred SSDs if a sanitize command is not available. Scenario B — Subcontractor returns backup tapes: require the subcontractor to provide purge/destruction certificates and a signed chain-of-custody; if receiving tapes with unknown history, degauss and then physically shred. Scenario C — USB drives found in drawers: treat as unknown media; document acquisition, either sanitize with vendor-recommended methods or physically destroy; log destruction with photos for the audit trail.
Compliance tips and best practices
Keep these practices to streamline compliance: 1) Deploy full-disk encryption by default (reduces need for physical destruction if keys are managed correctly); 2) Maintain an approved-tool whitelist and keep vendor validation or NIST-equivalent guidance; 3) Train operators on sanitization procedures and chain-of-custody; 4) Include sanitization/destruction requirements in contracts and flow them down to subcontractors; 5) Use tamper-evident evidence bags and timestamped photos for high-value disposals; 6) Run periodic tabletop exercises and spot-checks to demonstrate ongoing compliance to assessors.
Risk of not implementing proper sanitization and destruction
Failure to follow sanitization or destruction requirements can lead to data leakage (CUI exposure), mandatory breach notifications, contract sanctions, loss of Federal contracting eligibility, and reputational damage that is fatal for small businesses. Technically, residual data on improperly sanitized SSDs or reused drives has led to successful forensic recoveries—an avoidable risk when following documented procedures and using approved methods.
Summary: Build a simple, auditable workflow—inventory and classify media, choose Clear/Purge/Destroy based on device and data risk, use vendor-validated tools or physical destruction, document chain-of-custody and verification, and train staff. These practical controls map directly to FAR 52.204-21 and CMMC 2.0 Level 1 MP.L1-B.1.VII expectations and will help a small business demonstrate defensible, repeatable media disposition practices during assessments.