Sanitize or destroy media containing FCI before disposal or reuse
Storage media that has held Federal Contract Information must be sanitized before it is disposed of, donated, resold, or reused for a purpose where FCI should not be accessible. Simply deleting files is not sufficient: deleted data can be recovered with common forensic tools. Media sanitization means overwriting storage to a standard that makes recovery infeasible, or physically destroying the media so recovery is impossible. This applies to hard drives, SSDs, USB drives, tapes, printed documents, and any other medium that has stored FCI.
Implementation steps
- 1
Inventory media that has stored FCI
Identify all types of media in your environment that have held or may have held FCI: laptop and desktop hard drives, server drives, external drives, USB drives, backup tapes, optical media, and printed documents. Build a tracking process so you know which devices have handled FCI and need sanitization before disposal.
excel snipe-it - 2
Implement software-based sanitization for reusable media
For drives that will be reused internally, use NIST SP 800-88-compliant sanitization tools that overwrite all sectors. For SSDs and NVMe drives, use the manufacturer's secure erase command or ATA Secure Erase, as traditional overwriting may leave data in over-provisioned areas. Verify sanitization completed successfully and log the result.
blancco eraser nwipe - 3
Use physical destruction for drives leaving the organization
For media being disposed of, donated, or sent to a recycler, physical destruction (shredding or degaussing followed by shredding) is the most reliable method. Use a certified media destruction vendor who provides a certificate of destruction. For drives with encryption enabled, cryptographic erasure (destroying the encryption key) may be acceptable for some media types.
- 4
Establish a documented sanitization process
Write and follow a media sanitization procedure that specifies the method for each media type, who is responsible, and how results are documented. Maintain a sanitization log recording the device identifier, sanitization method, date, and the person who performed it.
excel servicenow
Evidence required
Media sanitization policy
Written policy defining sanitization methods for each media type and the process for disposal.
- - Media sanitization and disposal policy
- - Data destruction standard
Sanitization records
Logs or certificates documenting that media was sanitized before disposal or reuse.
- - Media sanitization log with device IDs and dates
- - Certificate of destruction from vendor
- - Blancco or similar tool erasure reports
Related controls
Limit physical access to systems and facilities to authorized individuals
Physical Access
Escort visitors and monitor visitor activity in secured areas
Physical Access
Maintain audit logs of physical access to secured areas
Physical Access
Control and manage physical access devices
Physical Access