Skip to content

3.8.3 — Destroy It Properly

Sanitize or destroy system media containing CUI before disposal or release for reuse.

Before any media that has contained CUI is disposed of or given to someone else, the CUI must be unrecoverable. Two scenarios, each assessed:

  1. Disposal. When media reaches end of life — decommissioned servers, old laptops, failed drives, obsolete tapes, paper documents being discarded — the CUI must be destroyed beyond recovery. For digital media, follow NIST SP 800-88 Rev. 1: cryptographic erase for SSDs (preferred), overwrite or degauss for HDDs, physical destruction (shredding, incineration, disintegration) for any media. For paper: cross-cut shredding at P-4 rating or higher. For optical media (CDs/DVDs): shredding.

  2. Reuse. When media is being repurposed — a laptop reassigned to a different employee, a server reprovisioned for a non-CUI role — the CUI must be fully sanitized before redeployment. This means more than deleting files. For drives: full disk wipe or cryptographic erase. For devices: factory reset plus drive sanitization (a factory reset alone may leave data recoverable).

For every sanitization or destruction event, document: what media (asset tag, serial number), what method was used, when, and who performed or verified it. For destruction by a third-party vendor, retain destruction certificates.

The assessor will ask for your sanitization procedure and review recent records. They may also ask about your handling of failed drives that can’t be wiped — the answer should be physical destruction, not shipping to a vendor.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is CUI media sanitized or destroyed before disposal?Destruction records: media ID, method (per NIST 800-88), date, person; destruction certificates from vendors
2Is CUI media sanitized before reuse?Sanitization records before redeployment; method documented; verification that sanitization was successful

Documents they’ll review: Media protection policy; media sanitization procedures referencing NIST 800-88; sanitization and destruction records; vendor destruction certificates; system security plan

People they’ll talk to: Personnel with media sanitization responsibilities; information security personnel; anyone who disposes of or repurposes CUI media

Live demos they’ll ask for: “Show me your sanitization procedure. Does it reference NIST 800-88?” “Show me destruction records from the last disposal.” “How do you handle SSDs vs. HDDs?” “What about failed drives that can’t be wiped?”


These are the actual questions. Have answers ready.

  • “Show me your media sanitization procedure. What standard does it follow?”
  • “Show me records from the last time you disposed of CUI media.”
  • “How do you sanitize SSDs? HDDs? Are the methods different?”
  • “What happens with a failed drive that can’t be sanitized — do you ship it or destroy it?”
  • “Show me a destruction certificate from your vendor.”
  • “How do you sanitize a laptop before reassigning it to a new employee?”
  • “How do you dispose of paper CUI? Show me the shredder.”

Delete instead of sanitize. Files deleted or drive reformatted — data is fully recoverable with free tools. Use NIST 800-88 methods: cryptographic erase, overwrite, degauss, or physical destruction. “Delete” and “format” are not sanitization.

No documentation. Media was properly destroyed but nobody recorded it. The assessor asks for records and you have nothing. Document every sanitization event: media ID, method, date, person. Keep destruction certificates from vendors.

Paper CUI in regular trash. CUI documents in the general waste bin. All paper CUI must be cross-cut shredded. Provide a shredder in the CUI work area or use a bonded shredding service.

Failed drives shipped to vendor. A drive with CUI fails and can’t be wiped, so it’s shipped back for warranty replacement. This is effectively shipping CUI to an unauthorized party. Destroy failed drives that can’t be sanitized — forfeit the warranty if necessary.

SSD sanitization misunderstood. Standard overwrite tools designed for HDDs don’t reliably sanitize SSDs due to wear leveling. Use the manufacturer’s secure erase command or cryptographic erase. NIST 800-88 has specific guidance for flash-based media.



RequirementWhy it matters here
3.7.3 — Wipe Before RepairSanitization before off-site maintenance — same methods apply
3.8.1 — Lock Up CUIMedia protection lifecycle: store securely, then sanitize at end of life
3.8.9 — Protect Your BackupsBackup media needs the same sanitization treatment at disposal
3.13.11 — Encrypt CUI at RestEncryption enables cryptographic erase as a sanitization method

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: MP.L2-3.8.3 | SPRS Weight: 5 points | POA&M Eligible: No