NIST 800-53 REV 5 • MEDIA PROTECTION

MP-6Media Sanitization

Sanitize {{ insert: param, mp-6_prm_1 }} prior to disposal, release out of organizational control, or release for reuse using {{ insert: param, mp-6_prm_2 }} ; and Employ sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.

CMMC Practice Mapping

NIST 800-171 Mapping

Supplemental Guidance

Media sanitization applies to all digital and non-digital system media subject to disposal or reuse, whether or not the media is considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, workstations, network components, mobile devices, and non-digital media (e.g., paper and microfilm). The sanitization process removes information from system media such that the information cannot be retrieved or reconstructed. Sanitization techniques—including clearing, purging, cryptographic erase, de-identification of personally identifiable information, and destruction—prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal. Organizations determine the appropriate sanitization methods, recognizing that destruction is sometimes necessary when other methods cannot be applied to media requiring sanitization. Organizations use discretion on the employment of approved sanitization techniques and procedures for media that contains information deemed to be in the public domain or publicly releasable or information deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes destruction, removing a classified appendix from an otherwise unclassified document, or redacting selected sections or words from a document by obscuring the redacted sections or words in a manner equivalent in effectiveness to removing them from the document. NSA standards and policies control the sanitization process for media that contains classified information. NARA policies control the sanitization process for controlled unclassified information.

Practitioner Notes

Before you dispose of media, release it outside your organization, or reuse it for a different purpose, you must sanitize it — remove all data in a way that prevents recovery. Simple file deletion is not sanitization.

Example 1: For hard drives being reused internally, use NIST 800-88 Clear methods — a full disk overwrite using a tool like DBAN (Darik's Boot and Nuke) or the built-in cipher /w:C:\ command on Windows. For drives being disposed of, use Purge or Destroy methods.

Example 2: For SSDs, use the manufacturer's secure erase utility (Samsung Magician, Intel SSD Toolbox) or physically destroy them with a drive shredder. Standard overwrite tools do not reliably sanitize SSDs due to wear leveling. Document every sanitization action in a media disposition log with date, method, and witness.