NIST 800-53 REV 5 • MEDIA PROTECTION

MP-6(8)Remote Purging or Wiping of Information

Provide the capability to purge or wipe information from {{ insert: param, mp-06.08_odp.01 }} {{ insert: param, mp-06.08_odp.02 }}.

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Supplemental Guidance

Remote purging or wiping of information protects information on organizational systems and system components if systems or components are obtained by unauthorized individuals. Remote purge or wipe commands require strong authentication to help mitigate the risk of unauthorized individuals purging or wiping the system, component, or device. The purge or wipe function can be implemented in a variety of ways, including by overwriting data or information multiple times or by destroying the key necessary to decrypt encrypted data.

Practitioner Notes

This enhancement provides the ability to remotely wipe or purge data from devices — critical for lost or stolen laptops, phones, and tablets. If a device goes missing, you need to erase it before the data is compromised.

Example 1: Enroll all company mobile devices and laptops in Microsoft Intune or another MDM solution. Enable remote wipe capability so you can erase a device's data immediately when it is reported lost or stolen. Test the remote wipe function on a test device quarterly.

Example 2: Configure Microsoft 365 Exchange Online with remote wipe policies for mobile devices accessing corporate email. In the Exchange admin center, under Mobile → Mobile Device Access, enable remote wipe capability. Document the procedure for initiating a remote wipe in your IR plan.