Maintenance 3.7.3 (3.7.3)

Ensure equipment removed for off-site maintenance is sanitized of any CUI.

Get Full Guidance

What Is This CMMC Control?

When equipment containing CUI needs to be sent off-site for maintenance or repair, you must remove or destroy all CUI from that equipment before it leaves your facility. This prevents unauthorized access to sensitive information by maintenance vendors, repair technicians, or anyone else who handles the equipment outside your control. Sanitization means making the data unrecoverable through approved methods like secure wiping, degaussing, or physical destruction depending on the media type and sensitivity.

Control Intent

Prevent unauthorized disclosure of CUI when equipment leaves organizational control for maintenance, repair, or servicing by ensuring all sensitive data is removed or destroyed before off-site transfer.

Who This Control Applies To

  • Any computing device, storage media, or system component that processes, stores, or transmits CUI and requires off-site maintenance
  • Hard drives, solid-state drives, and other storage media being sent for warranty repair or replacement
  • Laptops, desktops, servers, mobile devices, and network equipment requiring external servicing
  • Printers, copiers, and multifunction devices with internal storage being returned or repaired
  • Backup tapes, removable media, and portable storage devices sent for data recovery or repair

Not Applicable When

  • All maintenance is performed on-site by authorized personnel with appropriate clearances
  • Equipment never processes, stores, or transmits CUI at any point in its lifecycle
  • Maintenance is performed remotely without physical transfer of equipment
  • Equipment is destroyed on-site rather than sent for repair
  • Vendor performs maintenance at your facility under direct supervision with CUI access controls in place

Key Objectives

  • 1Protect CUI from unauthorized access during off-site maintenance activities
  • 2Ensure data remnants cannot be recovered from equipment sent for external repair or servicing
  • 3Establish and enforce sanitization procedures for all equipment types that may contain CUI before off-site transfer

Sample Self-Assessment Questions (Partial)

Do you ever send computers, hard drives, or other equipment off-site for repair or maintenance?

What types of equipment in your environment process or store CUI that might need external repair?

Implementation Approaches (High-Level)

Documented Sanitization Procedure with NIST SP 800-88 Compliance

Formal procedure requiring sanitization of all equipment before off-site maintenance using methods aligned with NIST SP 800-88 guidelines, with documentation and verification requirements

Advance Replacement and On-Site Repair Policy

Policy requiring vendors to provide advance replacement equipment or perform repairs on-site to avoid sending CUI-containing equipment off-site, eliminating sanitization requirements

Equipment Destruction for Failed Components

Policy requiring physical destruction of failed storage media and components that cannot be sanitized, rather than sending them off-site for repair or warranty return

Sanitization Tool Suite with Verification

Deployment of approved sanitization software and hardware tools with verification capabilities to ensure effective data removal before off-site maintenance

Vendor-Performed On-Site Sanitization with Oversight

Arrangement where maintenance vendors perform sanitization on-site under organizational oversight before removing equipment, with documented verification

Evidence & Assessment Notes

Expected Evidence

Organizations should maintain documentation and evidence demonstrating compliance with this control. This may include policy documentation, configuration records, audit logs, access reviews, and other relevant artifacts that show how the control is implemented and maintained.

Plan of Action & Milestones (POA&M)

If sanitization procedures do not exist, create documented procedures as immediate action and implement within 30-60 days If procedures exist but are not consistently followed, implement tracking and verification mechanisms within 60-90 days If sanitization tools do not meet NIST SP 800-88 standards, procure and deploy compliant tools within 90-120 days If training is inadequate, develop and deliver sanitization training to relevant personnel within 60 days If vendor contracts do not address sanitization, renegotiate or amend contracts at next renewal or within 180 days If records are inadequate, implement documentation and tracking system within 30-60 days For equipment already sent off-site without sanitization, conduct risk assessment and implement compensating controls immediately Consider advance replacement or on-site repair alternatives to reduce sanitization burden - evaluate and implement within 180 days If destruction capability is needed but not available, establish relationship with certified destruction vendor within 90 days Prioritize remediation based on volume of off-site maintenance, sensitivity of CUI, and assessment timeline

Frequently Asked Questions

What sanitization methods are acceptable under NIST SP 800-88 for different types of storage media?

NIST SP 800-88 defines three sanitization methods: Clear (logical techniques to sanitize data in user-addressable storage), Purge (physical or logical techniques that render data recovery infeasible using state-of-the-art laboratory techniques), and Destroy (physical destruction of media). For CUI, Purge or Destroy methods are typically required. Acceptable methods vary by media type: HDDs can be overwritten or degaussed, SSDs require cryptographic erase or physical destruction due to wear-leveling, and mobile devices should use built-in secure erase features or be physically destroyed.

What should we do if a hard drive fails completely and cannot be sanitized before warranty return?

If equipment cannot be sanitized due to failure, you have three options: physically destroy the equipment on-site and forfeit warranty coverage, negotiate advance replacement with the vendor so you receive a new drive before returning the failed one (which you then destroy), or work with the vendor to perform witnessed destruction at their facility with a certificate of destruction. The safest approach is on-site destruction, accepting the financial loss to eliminate CUI exposure risk.

Do we need to sanitize printers and copiers before sending them for repair?

Yes, modern printers and multifunction devices often have internal hard drives or memory that store copies of documents, scan images, print jobs, and configuration data that may include CUI. Before sending these devices off-site for maintenance, you must sanitize the internal storage using manufacturer-provided tools or procedures, or arrange for on-site repair. Check your device documentation to identify storage components and sanitization procedures.

How do we handle emergency situations where equipment needs immediate off-site repair?

Emergency situations do not exempt you from sanitization requirements. You should establish advance replacement agreements with vendors for critical systems, maintain spare equipment to swap out failed components, or have pre-approved destruction procedures for emergency situations. If equipment must be sent out urgently, document the risk decision, implement compensating controls such as vendor NDAs and secure shipping, and report it as an exception requiring management approval and potential POA&M.

Are there any situations where we can send equipment off-site without sanitization?

Equipment can be sent off-site without sanitization only if it has never processed, stored, or transmitted CUI at any point in its lifecycle, or if the vendor performs sanitization on-site under your direct oversight before removing the equipment. You must be able to definitively prove the equipment never contained CUI through inventory records, system documentation, or technical controls. When in doubt, sanitize.

What records do we need to maintain to demonstrate compliance with this control?

You should maintain sanitization logs including equipment identifier/serial number, date of sanitization, method used, personnel who performed it, verification results, and management approval. Also maintain your sanitization procedures, training records, vendor contracts addressing sanitization, and any destruction certificates. These records should be retained according to your record retention policy and be readily available for assessment.

How ConformatIQ Helps With CMMC Readiness

ConformatIQ is an AI-assisted CMMC readiness platform designed to help organizations prepare for assessments more efficiently. The platform supports document generation such as SSPs and POA&Ms, guided readiness workflows, centralized evidence tracking, and interview preparation for assessments.

Ready to Get Full Guidance?

Access complete implementation details, detailed assessment questions, evidence requirements, and expert guidance for this control.

Request Full Guidance

Information sourced from NIST SP 800-171 Rev. 2. See full disclaimer.