NIST SP 800-88

Media Sanitization for Data Security

NIST SP 800-88 Rev. 1 defines three sanitization categories: Clear, Purge, and Destroy. PTG implements media sanitization programs backed by forensic-grade verification from a Licensed Digital Forensic Examiner.

CMMC Registered Practitioner Org | BBB A+ Since 2003 | 23+ Years Experience
Three Methods

Clear, Purge, and Destroy

Data does not disappear when you delete a file or format a drive. Without proper sanitization, residual data remains recoverable with commercially available forensic tools.

Sanitization Categories

  • Clear: Logical overwrite protecting against simple recovery
  • Purge: Cryptographic erase or degaussing resisting lab attack
  • Destroy: Physical disintegration, incineration, or shredding
  • SSD-specific handling for wear leveling and over-provisioning

PTG Advantage

  • Licensed Digital Forensic Examiner (#604180) verification
  • Forensic recovery attempts to validate sanitization success
  • Automated certificate tracking linked to asset inventory
  • Self-encrypting drive (SED) cryptographic erase expertise
Compliance Mapping

SP 800-88 Supports Multiple Frameworks

NIST 800-53 MP-6

Primary media sanitization control. SP 800-88 is the referenced standard for implementation.

HIPAA ePHI Disposal

HIPAA violations for improper ePHI disposal carry fines up to $2.1 million per violation category per year.

CMMC Media Protection

CMMC Level 2 includes media protection practices derived from NIST 800-171 MP controls.

PCI DSS Data Disposal

PCI DSS requires secure destruction of cardholder data, with non-compliance fines up to $100,000/month.

Process

Media Sanitization Workflow

01

Inventory All Media

02

Categorize by Data Sensitivity

03

Select Sanitization Method

04

Execute Sanitization

05

Verify with Forensic Tools

06

Issue Certificate of Sanitization

Who This Is For

Built For

Healthcare (HIPAA) Defense Contractors (CMMC) Financial Services (PCI DSS) Federal Agencies (FISMA) Any Organization Decommissioning Equipment
FAQ

Frequently Asked Questions

Is deleting files or formatting a drive sufficient?

No. Standard deletion and formatting only remove file system references. The data remains on the media and is recoverable with forensic tools. NIST 800-88 defines the methods that actually eliminate data.

How do you sanitize SSDs?

SSDs require special handling due to wear leveling and over-provisioning. Cryptographic erase (for self-encrypting drives) or manufacturer-specific sanitize commands are the primary methods. PTG validates with forensic recovery attempts.

What is a Certificate of Sanitization?

A formal document recording the media type, serial number, sanitization method, date, operator, and verification results. NIST 800-53 control MP-6(1) requires these certificates for audit compliance.

When should media be destroyed vs. purged?

Destruction is required when media will leave organizational control and purge methods are unavailable or inadequate. For classified or highly sensitive data, destruction is often the only acceptable option.

How does 800-88 connect to incident response?

During incident response recovery, compromised media may need sanitization before reuse or disposal. SP 800-88 provides the methods; SP 800-61 governs the process.

Get Started

Ready to Properly Sanitize Your Media?

PTG delivers forensic-grade media sanitization programs that satisfy compliance auditors and actually destroy the data.