The next practice to be completed is located within the domain, Media Protection. For Level 1 compliance, there is only one Capability (Sanitize Media) and one Practice within that Capability: MP.1.118 – Sanitize or destroy information system media containing Federal contract information before disposal or release for reuse. Below is the information and description provided from CMMC V1.02, Appendix B, located on Pg 173 of the Appendices document.
Discussion from Source: Draft NIST SP 800-171, R2:
This requirement applies to all system media, digital and non-digital, subject to disposal or reuse. Examples include: Digital media found in workstations, network components, scanners, copiers, printers, notebook computers, and mobile devices; and non-digital media such as paper and microfilm. The sanitization process removes information from the media such that the information cannot be retrieved or reconstructed. sanitization techniques, including clearing, purging, cryptographic erase, and destruction to prevent the disclosure of information to unauthorized individuals when such media is released for reuse or disposal. Organizations determine the appropriate sanitization methods, recognizing that destruction may be necessary when other methods cannot be applied to the media requiring sanitization.
Organizations use discretion on the employment of sanitization techniques and procedures for media containing information that is in the public domain or publicly releaseable or deemed to have no adverse impact on organizations or individuals if released for reuse or disposal. Sanitization of non-digital media includes destruction, removing CUI from redacted sections or words in a manner equivalent ineffectiveness to removing the words or sections from the document. NARA policy and guidance control sanitization processes for controlled unclassified information. NIST SP 800-88, R1 provides guidance on media sanitization.
CMMC Clarification:
In this case media can mean something as simple as paper or storage devices like diskettes, disk, tapes, microfiche, thumb drives, CDs and DVDs, and even mobile phones. It is important to see what information is on these types of media. If there is Federal contract information (FCI) (information you or your company got during doing work for the federal government that is not shared publicly) you or someone in your company should do one of two things before throwing the media away:
Clean or purge the information, if you want to reuse the device or,
Shred or destroy the device so it cannot be read
See NIST SP 800-88, R1 for guidelines for media sanitization for more information.
Example
You are moving into a new office. As you pack for the move, you find some of your old CDs in a file cabinet. When you load the CDs into your computer drive you see that one has information about an old project your company did for the department of defense (DOD). Rather than throw the CD in the trash, you make sure it is shredded.
Until next time…
Mark Lupo, MBCP, SMP