Federal Law

FISMA: Federal Information Security Requirements for Media Disposal

The Federal Information Security Modernization Act (FISMA) of 2014, at 44 U.S.C. §3551 et seq., requires federal agencies to implement information security programs that protect federal information systems. Media disposal is a required component of every FISMA program. FISMA does not define its own destruction methods; it directs agencies to follow NIST SP 800-88 r2 for media sanitization. Data Destruction Inc. provides NIST SP 800-88 r2 Destroy-level shredding with documentation structured for FISMA audit requirements.

  • U.S. Congress; implemented by OMB, CISA, and NIST
  • Current: FISMA 2014 — 44 U.S.C. §3551 et seq., current
  • Jurisdiction: Federal
  • Federal agencies, federal information systems, and federal contractors operating systems on behalf of federal agencies

What Is FISMA?

The Federal Information Security Modernization Act of 2014 (FISMA) is the primary federal law governing information security for federal agencies and the systems that support them. FISMA at 44 U.S.C. §3551 et seq. requires every federal agency to develop, document, and implement an agency-wide information security program that protects the information and information systems that support the operations and assets of the agency. Media disposal is a mandatory component of that program.

Governing statute: Federal Information Security Modernization Act of 2014 (FISMA), 44 U.S.C. §3551 et seq., Public Law 113-283
Predecessor: Federal Information Security Management Act of 2002 (FISMA 2002), substantially modernized by the 2014 act
Primary implementation guidance: NIST SP 800-53 Rev 5 (security controls), NIST SP 800-88 r2 (media sanitization), FIPS 199 (security categorization)
Oversight: Office of Management and Budget (OMB) — policy oversight; CISA (Cybersecurity and Infrastructure Security Agency) — operational coordination; NIST — standards development
Annual reporting: Each agency head reports FISMA compliance annually to OMB and Congress

FISMA itself does not define specific technical methods for media sanitization. Instead, it requires agencies to implement security controls based on NIST guidance. The applicable NIST standard for media disposal is NIST SP 800-88 r2, which every federal agency is required to follow when sanitizing or disposing of media that contains federal information.


What FISMA Requires for Media Disposal

FISMA’s media disposal requirements flow through the NIST SP 800-53 Rev 5 control catalog, specifically the Media Protection (MP) family. NIST SP 800-88 r2 is the technical standard that implements these controls for federal agencies.

Control MP-6: Media Sanitization (NIST SP 800-53 Rev 5)

NIST Control: MP-6 (Media Sanitization)
What it requires: The organization sanitizes information system media, both digital and non-digital, prior to disposal, release out of organizational control, or release for reuse.
Applicable sanitization standard: NIST SP 800-88 r2 — the method must match the media type and the security categorization of the system.

MP-6 Enhancement (1) — Review, Approve, Track, Document, Verify: Agencies must review, approve, track, document, and verify media sanitization and disposal actions.

MP-6 Enhancement (2) — Equipment Testing: Agencies must test sanitization equipment and procedures to verify correct performance annually.

Control MP-7: Media Use (NIST SP 800-53 Rev 5)

NIST Control: MP-7 (Media Use)
What it requires: The organization restricts the use of certain types of information system media on information systems or system components.
Relevance to disposal: Restricted media that is removed from service must be sanitized per MP-6 requirements before disposal.

Control MP-8: Media Downgrading (NIST SP 800-53 Rev 5)

NIST Control: MP-8 (Media Downgrading)
What it requires: The organization establishes a downgrading process for information system media that includes verification of downgrading actions.
Relevance to disposal: Classified or high-sensitivity media being moved to a lower classification level requires documented downgrading before disposal or reuse.

FIPS 199 Security Categorization

Standard: FIPS Publication 199 (Standards for Security Categorization of Federal Information and Information Systems)
What it does: Assigns information systems a security category of Low, Moderate, or High based on the potential impact of a breach of confidentiality, integrity, or availability.
Relevance to disposal: The FISMA security category determines the required sanitization level under NIST SP 800-88 r2. Low-categorization systems permit Clear-level disposal for reuse. High-categorization systems require Destroy-level disposal for final disposition.


How Data Destruction Inc. Satisfies FISMA Requirements

Data Destruction Inc. provides federal agency data destruction services that satisfy NIST SP 800-53 Rev 5 control MP-6 through documented NIST SP 800-88 r2 Destroy-level physical destruction.

NIST 800-53 Control DDI Service NIST r2 Category Federal audit evidence
MP-6 (disposal) Hard drive shredding Destroy (§3.1.3) Certificate of Destruction with r2 section + serialized inventory
MP-6 (disposal) Hard drive crushing Destroy (§3.1.3) Certificate of Destruction with r2 section + serialized inventory
MP-6 (reuse) Data wiping Clear/Purge (§3.1.1/§3.1.2) Certificate of Destruction + wipe report
MP-6 + witness Witnessed destruction All categories CoD + signed witness page + chain-of-custody log
MP-6 Enhancement (2) Documented destruction procedures N/A Service agreement specifying NIST 800-88 r2 methods

The Certificate of Destruction issued by Data Destruction Inc. documents every required element of MP-6 compliance: media type, sanitization method, NIST SP 800-88 r2 category and section, serialized asset inventory (one entry per device), date and location, technician name and signature, and witness signature. These certificates satisfy the “review, approve, track, document, and verify” requirement of MP-6 Enhancement (1).


Who Must Comply with FISMA?

FISMA applies to federal agencies and to certain categories of contractors and third parties.

Federal agencies (mandatory): All federal executive branch agencies must implement FISMA-compliant information security programs. This includes departments, agencies, offices, and commissions of the executive branch of the federal government.

Federal contractors: Organizations that operate federal information systems under a contract or agreement with a federal agency must comply with the same FISMA requirements as the agency itself, as specified in the contract. A contractor managing an agency’s IT infrastructure is subject to the same MP-6 media sanitization requirements as the agency.

State and local governments receiving federal grants or operating systems on behalf of federal programs may be subject to FISMA-aligned requirements under the conditions of the grant or agreement.

Military components: DoD components follow FISMA but implement it through DoD Instruction 8500.01 and related policy, with CMMC adding contractor-side requirements. The underlying NIST standards (SP 800-88 r2, SP 800-53 Rev 5) apply across both civilian and defense contexts.


FISMA Audit Process and Media Disposal Findings

FISMA requires annual reporting from each agency to OMB and Congress. Agency Inspectors General (IGs) conduct independent FISMA evaluations. Media disposal is a recurring finding category in FISMA audits.

Annual FISMA report: Each agency submits an annual FISMA report to OMB covering security status, vulnerabilities, and corrective action plans. OMB publishes a consolidated annual FISMA report to Congress.

IG evaluations: Agency IGs evaluate the effectiveness of the agency’s information security program independently. IG FISMA evaluations frequently include testing of media sanitization practices.

Common FISMA media disposal audit findings: media disposed of without documented sanitization (no Certificate of Destruction); sanitization method did not match NIST SP 800-88 r2 requirements for the media type; no serialized inventory of destroyed assets; sanitization equipment not tested annually (missing MP-6 Enhancement (2) compliance); and end-of-life media stored in unsecured locations rather than being sanitized.

Consequence of a finding: An IG finding that an agency failed to follow NIST SP 800-88 r2 for media disposal results in a Material Weakness in the agency’s FISMA report. Material Weaknesses are reported to Congress and require a documented corrective action plan with a specific remediation timeline.


Media Disposal Requirements by FIPS 199 Security Category

Under FISMA, the required sanitization level depends on the FIPS 199 security category of the information system. High-categorization systems require Destroy-level disposal for final disposition. Use this matrix to match the system category to the correct NIST SP 800-88 r2 method.

FIPS 199 Category Examples NIST r2 Category for Final Disposal DDI Method
Low Public information systems, internal communication tools Clear (§3.1.1) acceptable for reuse; Destroy for final disposal Data wiping or shredding
Moderate Federal employee HR systems, grant management, benefits systems Purge (§3.1.2) or Destroy (§3.1.3) for final disposal Shredding / crushing
High Law enforcement databases, intelligence systems, financial clearinghouses Destroy (§3.1.3) required for permanent disposal Witnessed shredding with CoD
All categories — SSDs Any SSD or NVMe storage regardless of system category Destroy (§3.1.3) or Purge via CE (§3.1.2 + §3.2) Shredding (CE requires §3.2 verification)
All categories — reuse Any media reassigned within the same agency Clear (§3.1.1) within same boundary; Purge if leaving boundary Data wiping with wipe report

Standards and Frameworks That Implement FISMA Requirements

FISMA does not define its own technical methods. It directs agencies to implement NIST standards. The following standards, policies, and frameworks form the FISMA compliance stack for media disposal. A documented NIST SP 800-88 r2 Destroy-level process satisfies all of them simultaneously.


Authoritative Source and Official Regulation

Authoritative Source · cisa.gov

FISMA · Federal Information Security Modernization Act of 2014, 44 U.S.C. §3551 et seq.

cisa.gov/fisma ↗

Oversight: OMB, CISA, NIST · Annual reporting to Congress

Current: FISMA 2014, Public Law 113-283 — implementing guidance via NIST SP 800-53 Rev 5

View FISMA 2014 (PDF) ↗


Frequently Asked Questions

Does FISMA require a specific destruction method for federal media?

FISMA itself does not specify methods. It requires agencies to follow NIST guidance. The applicable NIST standard is NIST SP 800-88 r2, which defines Clear, Purge, and Destroy methods by media type and security category. For federal information systems categorized as Moderate or High under FIPS 199, Destroy-level disposal (physical shredding or crushing) is the standard method for permanent disposal.

Does FISMA apply to federal contractors?

Yes. Federal contractors that operate federal information systems under agency contracts must implement the same FISMA controls as the agency itself. The contract specifies the applicable security requirements. A contractor managing federal servers, data centers, or IT infrastructure must sanitize decommissioned media per NIST SP 800-88 r2 and provide the agency with the documentation required for FISMA MP-6 compliance.

What documentation does a FISMA audit require for media disposal?

A FISMA audit evaluating MP-6 compliance looks for: a written media sanitization policy, a log of all media sanitized or destroyed (serialized, with dates and methods), evidence that the sanitization method matched NIST SP 800-88 r2, and annual testing records for sanitization equipment. The Certificate of Destruction from Data Destruction Inc. satisfies the destruction event documentation requirement. The service agreement with DDI satisfies the written policy component for contracted disposal.

What is the relationship between FISMA and CMMC?

FISMA governs civilian federal agencies and their contractors. CMMC governs defense contractors specifically. Both frameworks require media sanitization per NIST SP 800-88 r2 and both use NIST SP 800-53 Rev 5 as the control framework. CMMC adds a third-party assessment requirement (C3PAO) for Level 2 contractors that FISMA does not require for civilian contractors. A defense contractor may face both FISMA requirements (through a federal contract) and CMMC requirements (through a DoD contract) simultaneously.

Who oversees FISMA compliance for federal agencies?

OMB sets FISMA policy and reviews agency reports. CISA provides operational coordination, including incident response support and assessment tools. Agency Inspectors General conduct independent evaluations. NIST develops the technical standards (SP 800-53 Rev 5, SP 800-88 r2) that implement FISMA requirements. For civilian agencies, the agency CIO is accountable for the agency’s FISMA posture. For DoD, the DoD CIO oversees FISMA compliance across the military departments.

Need media sanitization and destruction services that satisfy FISMA?

Bonded · Insured · 24-Hour Certificate of Destruction · Methods follow FISMA