Federal Framework

CMMC 2.0 Media Sanitization: Defense Contractor Requirements for CUI

The Cybersecurity Maturity Model Certification (CMMC) 2.0 program, codified at 32 CFR Part 170 and effective December 16, 2024, requires defense contractors handling Controlled Unclassified Information to implement media sanitization practices per NIST SP 800-88 r2. Failure to comply disqualifies a contractor from DoD contract awards. Data Destruction Inc. provides witnessed, documented NIST SP 800-88 r2 Destroy-level destruction for defense contractors at every CMMC level.

  • U.S. Department of Defense (DoD)
  • Current: CMMC 2.0 — 32 CFR Part 170, effective December 16, 2024
  • Jurisdiction: Federal
  • Defense contractors and subcontractors handling Controlled Unclassified Information (CUI) on DoD contracts

What Is CMMC 2.0?

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is the Department of Defense’s framework for verifying that defense contractors and subcontractors protect Controlled Unclassified Information (CUI) stored on their systems and media. CMMC 2.0 was codified at 32 CFR Part 170, effective December 16, 2024. A separate Defense Federal Acquisition Regulation Supplement (DFARS) rule, effective November 10, 2025, integrates CMMC requirements into DoD contract solicitations.

Governing regulation: 32 CFR Part 170 (CMMC Program)
Current version: CMMC 2.0 — final rule effective December 16, 2024
DFARS integration: DFARS clause effective November 10, 2025 — required in applicable DoD contracts on a three-year rollout
Enforcement: DoD contracting officers; C3PAOs (CMMC Third Party Assessment Organizations) for Level 2
Official resource: dodcmmc.org

CMMC replaced the previous self-attestation model under DFARS 252.204-7012 with a tiered, verified certification requirement. CMMC 2.0 reduces the original 5-level model to 3 levels: Level 1 (Foundational), Level 2 (Advanced), and Level 3 (Expert). Most defense contractors handling CUI operate at Level 2.

Important note: CMMC is a contractor certification program, not a vendor certification program. Data Destruction Inc. does not hold CMMC certification. CMMC certifies the defense contractor’s overall cybersecurity posture, including its media sanitization practices. Data Destruction Inc. provides the destruction services that help contractors satisfy the media sanitization domain of their CMMC assessment.


What CMMC 2.0 Requires for Media Sanitization

CMMC 2.0 aligns its practices with NIST SP 800-171 Rev 3 and NIST SP 800-82 for OT systems. Media sanitization falls under the Media Protection (MP) domain. The specific CMMC practices mirror the NIST SP 800-171 MP controls.

Practice MP.L2-3.8.3: Sanitize or Destroy Information System Media Before Disposal

CMMC Practice: MP.L2-3.8.3
NIST 800-171 Source: 3.8.3 — Sanitize or destroy information system media before disposal or reuse
What it requires: Defense contractors must sanitize or destroy CUI media before it is disposed of or reused. The sanitization method must render CUI unrecoverable.
Applicable NIST standard: NIST SP 800-88 r2 is the referenced standard for CUI media sanitization in DoD guidance.
CMMC Level: Level 2 and Level 3 (Level 1 does not address CUI)

Practice MP.L2-3.8.4: Mark Media with CUI Markings and Distribution Limitations

CMMC Practice: MP.L2-3.8.4
What it requires: Mark media containing CUI with appropriate CUI markings and distribution limitations.
Relevance to disposal: Media must be identifiable as CUI-bearing before disposal so that appropriate sanitization is applied. Unmarked media may not receive required sanitization treatment.

Practice MP.L2-3.8.7: Control the Use of Removable Media on System Components

CMMC Practice: MP.L2-3.8.7
What it requires: Control the use of removable media on system components, with restrictions on use on external systems.
Relevance to disposal: Removable media (USB drives, external SSDs, backup tapes) used on systems processing CUI is subject to full MP.L2-3.8.3 sanitization requirements before disposal.

Practice MP.L2-3.8.9: Protect Backups of CUI

CMMC Practice: MP.L2-3.8.9
What it requires: Protect the confidentiality of backup CUI at storage locations.
Relevance to disposal: Backup tapes and drives storing CUI backups require the same MP.L2-3.8.3 sanitization before disposal as primary storage media.


How Data Destruction Inc. Satisfies CMMC Media Sanitization Requirements

Data Destruction Inc. provides defense contractor data destruction services that satisfy MP.L2-3.8.3 through documented, NIST SP 800-88 r2 Destroy-level physical destruction.

CMMC Practice DDI Service NIST r2 Category Documentation
MP.L2-3.8.3 (disposal) Hard drive shredding Destroy (§3.1.3) Certificate of Destruction with r2 section
MP.L2-3.8.3 (disposal) Hard drive crushing Destroy (§3.1.3) Certificate of Destruction with r2 section
MP.L2-3.8.3 (reuse) Data wiping Clear/Purge (§3.1.1/§3.1.2) Certificate of Destruction + wipe report
MP.L2-3.8.3 + witness Witnessed destruction All categories CoD + signed witness documentation

The Certificate of Destruction issued by Data Destruction Inc. documents: the NIST SP 800-88 r2 category and section, the serialized asset inventory (one entry per device), the date and location, the destruction method, and the witness signature. CMMC assessors and DoD auditors accept this documentation as evidence of MP.L2-3.8.3 compliance.

Continuous chain of custody: From pickup through destruction, Data Destruction Inc. maintains documented chain of custody. For defense contractors, chain of custody documentation is part of the audit evidence package required for CMMC assessment.


CMMC Level Requirements and Media Sanitization

CMMC 2.0 has 3 levels. Media sanitization requirements apply starting at Level 2.

Level Name Who it applies to Assessment type Media sanitization
Level 1 Foundational Contractors with Federal Contract Information (FCI) but no CUI Annual self-assessment Basic cybersecurity hygiene; no specific MP practices required
Level 2 Advanced Contractors handling CUI on DoD programs Third-party assessment (C3PAO) every 3 years for critical programs; annual self-assessment for others MP.L2-3.8.3 through 3.8.9 required — NIST 800-88 r2 sanitization
Level 3 Expert Contractors on DoD’s highest-priority programs DIBCAC government-led assessment All Level 2 practices plus additional requirements from NIST SP 800-172

Most defense contractors that handle engineering drawings, specifications, technical data, or any CUI operate at Level 2 and require third-party CMMC assessment by a C3PAO. Level 2 is where the media sanitization practices are binding.


Who Must Comply with CMMC 2.0?

CMMC 2.0 applies to any organization that seeks to perform on DoD contracts or subcontracts that involve CUI or FCI.

Directly covered: prime defense contractors receiving DoD contracts that include a CMMC clause; subcontractors of prime contractors, to the extent they handle CUI that flows down from the prime; and defense industrial base (DIB) suppliers at any tier of the supply chain that receive CUI from the DoD or a prime contractor.

CUI defined: Controlled Unclassified Information is information the government creates or possesses that requires safeguarding or dissemination controls but is not classified. CUI in the defense context includes technical data, engineering specifications, export-controlled information (ITAR/EAR), and sensitive program information.

The DFARS rollout (November 2025): Starting November 10, 2025, new DoD contracts and contract renewals include CMMC requirements on a rolling three-year implementation schedule. By November 2028, all applicable DoD contracts require full CMMC compliance.

Subcontractors: A prime contractor must flow CMMC requirements down to subcontractors that handle CUI. If a defense subcontractor provides IT services or data center decommissioning to a prime, the subcontractor’s media handling practices are part of the prime’s CMMC compliance posture.


Enforcement and Consequences

CMMC 2.0 enforcement operates through the DoD contracting process rather than direct civil or criminal penalties.

Direct consequences of non-compliance: A contractor without a required CMMC certification cannot be awarded a DoD contract that contains a CMMC clause. A contractor that misrepresents its CMMC compliance status on a contract bid may face prosecution under the False Claims Act (31 U.S.C. §3729), with treble damages and civil penalties per false claim. A contractor that fails a CMMC assessment may be suspended or debarred from federal contracting.

False Claims Act exposure: The DoD Cyber Fraud Initiative has already used the False Claims Act to pursue defense contractors that falsely certified their cybersecurity posture. Misrepresenting media sanitization compliance in a CMMC self-attestation is within scope of this initiative.


CUI Media Sanitization: Method by Media Type

CMMC 2.0 Practice MP.L2-3.8.3 requires sanitization or destruction of CUI media per NIST SP 800-88 r2. Use this matrix to match each media type that may contain Controlled Unclassified Information to the correct sanitization method. For permanent disposal of CUI, Destroy-level shredding is the standard approach for CMMC assessment evidence.

CUI Media Type CMMC Practice NIST r2 Category for Disposal DDI Method
Hard drives (HDD / SSD) MP.L2-3.8.3 Destroy (§3.1.3) — permanent disposal Hard drive shredding or crushing
NVMe drives MP.L2-3.8.3 Destroy (§3.1.3) or Purge via CE (§3.1.2) Shredding (CE requires §3.2 verification)
Backup tapes (CUI backups) MP.L2-3.8.3 + MP.L2-3.8.9 Destroy (§3.1.3) Tape shredding / degauss + shred
Removable media (USB, SD) MP.L2-3.8.3 + MP.L2-3.8.7 Destroy (§3.1.3) Physical shredding
Mobile devices MP.L2-3.8.3 Purge (§3.1.2) or Destroy (§3.1.3) Crypto Erase or physical shred
Media for reuse (same clearance) MP.L2-3.8.3 Clear or Purge (§3.1.1/§3.1.2) Data wiping with wipe report

Standards and Frameworks That Interact with CMMC 2.0

CMMC 2.0 is built on NIST SP 800-171 Rev 3, which itself draws from NIST SP 800-53 and NIST SP 800-88 r2. Defense contractors at Level 2 must satisfy these overlapping standards. A single documented NIST SP 800-88 r2 destruction process satisfies CMMC, FISMA contractor requirements, and NISPOM simultaneously.


Authoritative Source and Official Regulation

Authoritative Source · DoD / dodcmmc.org

CMMC 2.0 · 32 CFR Part 170, effective December 16, 2024

acq.osd.mil/cmmc ↗

Enforcement · DoD Contracting Officers + C3PAOs

Current: CMMC 2.0 Final Rule — December 16, 2024. DFARS clause effective November 10, 2025.

View dodcmmc.org ↗


Frequently Asked Questions

What NIST standard does CMMC 2.0 require for media sanitization?

CMMC 2.0 Level 2 Practice MP.L2-3.8.3 requires sanitization or destruction of CUI media per NIST SP 800-171 Rev 3 control 3.8.3. NIST SP 800-171 implements its media sanitization requirements by reference to NIST SP 800-88 r2, which is the operative technical standard. Defense contractors must use Clear, Purge, or Destroy methods per NIST SP 800-88 r2, with Destroy-level (physical shredding or crushing) as the standard for CUI media disposed of permanently.

Is Data Destruction Inc. CMMC certified?

No. CMMC is a contractor certification program that certifies a defense contractor’s overall cybersecurity posture and practices. It is not a vendor certification program. Data Destruction Inc. is a destruction services vendor, not a defense contractor seeking DoD contracts. The CMMC certification belongs to the contractor who hires Data Destruction Inc. to perform compliant media destruction. DDI provides the service and documentation that satisfies MP.L2-3.8.3; the contractor achieves the certification.

What documentation does a CMMC assessor need for media sanitization?

A C3PAO assessor evaluating MP.L2-3.8.3 looks for: a written media sanitization policy, a record of all media sanitized or destroyed (serialized), evidence that the sanitization method meets NIST SP 800-88 r2, and documentation of third-party vendor practices where a destruction vendor is used. The Certificate of Destruction from Data Destruction Inc. satisfies the third-party evidence requirement. Contractors should retain these certificates in their system security plan (SSP) evidence package.

Does CMMC media sanitization apply to subcontractors?

Yes. The CMMC clause flows down to subcontractors that handle CUI. If a subcontractor receives, stores, or processes CUI on any system or media, that media is subject to MP.L2-3.8.3 requirements before disposal. Subcontractors must either achieve their own CMMC certification or work under a prime contractor’s approved plan that accounts for subcontractor CUI handling.

What is the difference between CMMC 1.0 and CMMC 2.0 for media sanitization?

CMMC 1.0 (2020) used 5 maturity levels with 171 practices. CMMC 2.0 (final rule 2024) reduced this to 3 levels with practices aligned directly to NIST SP 800-171 Rev 3 and NIST SP 800-172. The media sanitization practices (MP domain) in CMMC 2.0 are drawn directly from NIST SP 800-171 controls 3.8.1 through 3.8.9, mapped to CMMC practice identifiers MP.L2-3.8.1 through MP.L2-3.8.9. For practical purposes, the destruction requirement (sanitize or destroy CUI media per NIST 800-88 r2) is substantively the same in both versions.

Need media sanitization and destruction services that satisfy CMMC 2.0 Media Sanitization?

Bonded · Insured · 24-Hour Certificate of Destruction · Methods follow CMMC 2.0 Media Sanitization