Call or Text Today

(612) 888-4968
Text photos

NIST SP 800-88 (Rev. 1) — data sanitization explained

NIST SP 800-88 is the common language used by security teams, auditors, and insurers when they ask: “How do you know the data is gone?” This guide explains the parts that matter operationally—without turning it into a policy lecture.

Usually responds within 15 minutes. Text photos of equipment for a fast assessment.

Why NIST 800-88 comes up in real conversations

Most organizations do not get in trouble because they recycled electronics—they get in trouble because they cannot explain what happened to data-bearing devices under their responsibility. NIST SP 800-88 is a practical framework for turning “we wiped it” into an outcome you can defend.

You will see NIST 800-88 referenced in policies, vendor questionnaires, cyber insurance questions, and breach response postmortems. It is a way of standardizing the “how” behind device retirement.

Clear vs Purge vs Destroy (plain language)

NIST 800-88 defines sanitization categories. The categories are less about marketing terms and more about risk boundaries.

  • Clear: logical techniques that remove data in a way that blocks typical software-based recovery. This is common when media stays in controlled environments and risk is moderate.
  • Purge: methods that make recovery infeasible even with advanced laboratory techniques. This is often the expectation for higher risk environments or certain media types and policies.
  • Destroy: physical destruction so the media cannot be reused. This is used when policy or risk tolerance does not allow any chance of recovery.

The best operational approach is usually: decide the required outcome by policy and risk, then choose a method that reliably produces that outcome for the media type.

Verification (the part most people skip)

“We ran a wipe tool” is not the same as “the device was sanitized.” Verification is the bridge between effort and evidence. In practice, verification means you can show that the method completed and met the intended outcome for that device or class of devices.

If your security team cares about defensibility, they usually care about verification more than buzzwords—because verification is what survives a compliance review.

Documentation and chain of custody (what stakeholders want)

Documentation is about reconciling reality. A good record set helps a team answer:

  • What equipment left the building?
  • Who had custody during transport?
  • What sanitization or destruction path was used?
  • What was the final disposition (reuse, parts recovery, recycling)?

If you want the custody layer explained end-to-end, read why chain of custody matters.

Wiping vs shredding (why policies differ)

Some policies allow verified wiping. Others mandate physical destruction for specific asset classes. This is typically driven by sensitivity, threat model, and the cost of being wrong.

We break down the practical differences in wiping vs shredding.

Related service page

If you’re evaluating vendors, our operational approach is described on hard drive destruction & wiping.