Choosing the wrong sanitization method can mean wasted money, wasted time, or — worst case — a data breach from a drive you thought was clean. With different rules for HDDs versus SSDs, varying sensitivity levels, and a range of compliance requirements, the decision is not always obvious. This flowchart walks you through each branching point so you land on the right method every time.
Key Takeaways:
- The first question is always whether the drive is functional — dead drives cannot be wiped with software and require physical destruction
- HDDs and SSDs demand different sanitization approaches because of how they store data at the hardware level
- NIST 800-88 defines three levels — Clear, Purge, and Destroy — and your data sensitivity determines which one you need
- Compliance requirements (HIPAA, GDPR, PCI DSS) may mandate specific sanitization levels and documentation
- Matching the right method to your situation saves time, money, and avoids false confidence in incomplete erasure
The Decision Flowchart
Follow each numbered decision point. Your answers lead you through the branches to a specific sanitization method and NIST 800-88 level.
Decision 1: Is the drive functional?
Does the drive power on, get recognized by your system, and respond to read/write commands?
- YES → Go to Decision 2
- NO (dead, clicking, unresponsive, physically damaged) → Endpoint A: Physical Destruction (NIST Destroy)
- HDD: Degauss + shred, or disintegrate
- SSD: Shred or disintegrate (degaussing does not work on flash memory)
- See our guide on wiping a dead hard drive for details
Decision 2: Is it an HDD or SSD?
Check the drive type. HDDs have spinning magnetic platters. SSDs (SATA and NVMe) use flash memory chips.
- HDD → Go to Decision 3H (HDD path)
- SSD → Go to Decision 3S (SSD path)
HDD Path
Decision 3H: What is the data sensitivity level?
- Low sensitivity (no personal data, no regulated data, general business files) → Go to Decision 4H-Low
- Medium sensitivity (personal data, financial records, employee files, customer data) → Go to Decision 4H-Med
- High sensitivity (classified, top-secret, data subject to strict regulatory requirements) → Endpoint B: Physical Destruction (NIST Destroy)
- Degauss followed by physical shredding or disintegration
- Required by many government and defense frameworks for classified media
Decision 4H-Low: Will you reuse the drive?
- YES → Endpoint C: Single-Pass Overwrite (NIST Clear)
- NO → Endpoint D: Single-Pass Overwrite then Recycle/Dispose (NIST Clear)
- Same method as Endpoint C, but the drive goes to e-waste or recycling after
- Overwrite before disposal even for low-sensitivity data — no reason to skip it
Decision 4H-Med: Do you need compliance documentation?
- YES (HIPAA, PCI DSS, GDPR, SOX, or internal policy requires proof) → Endpoint E: Verified Overwrite with Certificate (NIST Purge)
- Tools: BitRaser or other professional erasure software with reporting
- Multi-pass overwrite with automatic verification
- Generates a certificate of erasure with drive serial number, method used, and pass/fail status
- Store certificates with your compliance records
- NO → Endpoint F: Single-Pass Overwrite with Verification (NIST Clear)
- Tools: DBAN, ShredOS/nwipe, or BitRaser
- One pass with post-wipe verification read
- Sufficient when drives stay within your organization or go to trusted recyclers
SSD Path
Decision 3S: What is the data sensitivity level?
- Low sensitivity → Go to Decision 4S-Low
- Medium sensitivity → Go to Decision 4S-Med
- High sensitivity (classified or strictly regulated) → Endpoint G: Physical Destruction (NIST Destroy)
- Shred or disintegrate the SSD — degaussing does not affect flash memory
- Required for classified media and some high-security regulatory environments
Decision 4S-Low: Will you reuse the drive?
- YES → Endpoint H: Firmware-Level Erase (NIST Purge)
- SATA SSD: ATA Secure Erase via manufacturer tool (Samsung Magician, WD Dashboard, Crucial Storage Executive) or hdparm
- NVMe SSD: NVMe Sanitize (Block Erase) via nvme-cli or manufacturer tool
- Self-encrypting drive (SED): Crypto erase is an option if encryption was enabled
- Drive returns to factory-fresh state
- NO → Endpoint I: Firmware-Level Erase then Dispose (NIST Purge)
- Same firmware erase as Endpoint H, performed before disposal
- Do not skip the erase just because the drive is being discarded — data is still recoverable from an un-wiped SSD
Decision 4S-Med: Do you need compliance documentation?
- YES → Endpoint J: Verified Firmware Erase with Certificate (NIST Purge)
- Tools: BitRaser — issues firmware-level erase commands and generates tamper-proof certificates
- Supports both SATA and NVMe drives
- Certificate includes drive serial, model, erase method, verification result, and timestamp
- Required for regulatory compliance (HIPAA, GDPR, PCI DSS)
- NO → Endpoint H: Firmware-Level Erase (NIST Purge)
- Same as the low-sensitivity reuse path — firmware erase is the minimum acceptable method for any SSD sanitization
Bottom Line: If it is an HDD, overwrite it. If it is an SSD, use firmware-level erase commands. If it is dead or classified, destroy it physically. If you need compliance proof, use professional software that generates certificates. Every other decision branches from these four rules.
Understanding Each Decision Point
Why Drive Functionality Comes First
No software — free or paid — can erase data from a drive that does not respond to commands. A dead drive with a seized motor, failed controller board, or corrupt firmware will not accept overwrite instructions or firmware erase commands. The only option is physical destruction.
This is also a security consideration. If a drive fails mid-wipe, you cannot be certain how much data remains. Treat a drive that dies during sanitization the same as a drive that was never wiped: destroy it or send it to a certified destruction service.
For more on handling non-functional drives, see our guide to wiping dead hard drives.
Why HDD and SSD Paths Differ
The split between HDDs and SSDs is not a minor technicality — it is the most important branching point in the flowchart.
HDDs store data magnetically on spinning platters. When you overwrite a sector, the write head physically replaces the magnetic pattern with new data. A single overwrite pass reaches every addressable sector, and modern drive densities make recovery from overwritten platters practically impossible. This is why NIST 800-88 considers a one-pass overwrite sufficient for Clear-level HDD sanitization.
SSDs store data in flash memory cells managed by a controller with its own internal logic. The flash translation layer (FTL) remaps write operations for wear leveling and performance. Over-provisioned space — extra NAND capacity hidden from the operating system — holds data that overwrite commands never touch. This is why overwriting an SSD through the OS is unreliable and why NIST 800-88 Rev. 2 requires firmware-level commands (ATA Secure Erase, NVMe Sanitize, or crypto erase) to reach Purge level on SSDs.
Read our complete SSD secure erase guide for step-by-step instructions on each method.
How Data Sensitivity Maps to NIST Levels
NIST 800-88 does not tell you exactly which level to use for every situation — it provides a framework and expects organizations to make risk-based decisions. Here is how the three levels map to practical sensitivity categories:
| NIST Level | Protects Against | Typical Use Case |
|---|---|---|
| Clear | Recovery with standard software tools (Recuva, PhotoRec, TestDisk) | Low-sensitivity data; drives staying within your organization |
| Purge | Laboratory-level recovery with specialized equipment and techniques | Personal data, financial records, customer data; drives leaving your control |
| Destroy | Any recovery attempt, including nation-state resources | Classified data, top-secret information, highest-risk regulatory scenarios |
Most organizations dealing with personal data (names, emails, financial records, health information) should target Purge as their default level. Clear is acceptable only when the drive remains within a trusted environment and the data carries minimal risk if exposed.
For a deeper look at these levels, see our NIST 800-88 explainer.
When Compliance Documentation Matters
If your organization is subject to any of the following, you need documented proof of sanitization:
- HIPAA — Protected health information (PHI) on decommissioned devices
- GDPR — Right to erasure requests and end-of-life device processing
- PCI DSS — Cardholder data on retired payment systems
- SOX — Financial records on disposed hardware
- CMMC — Controlled unclassified information (CUI) in defense supply chains
A certificate of erasure is your evidence that sanitization was performed correctly. Without it, you are relying on someone's word that the process happened. Professional tools like BitRaser generate certificates automatically, including the drive serial number, sanitization method, verification result, and timestamp.
Even if you are not required by regulation, keeping erasure records is a smart practice. If a drive you disposed of is ever linked to a data breach, a certificate proves you followed proper procedures. See our media sanitization policy guide for building a complete policy framework.

Quick-Reference Scenarios
Selling a Personal Laptop
- Drive type: Likely SSD (most laptops since 2015)
- Sensitivity: Medium — personal files, passwords in browser, financial documents
- Reuse: Yes (buyer will use the drive)
- Compliance: Not typically required for personal use
- Flowchart path: Decision 1 (YES) → Decision 2 (SSD) → Decision 3S (Medium) → Decision 4S-Med (NO) → Endpoint H: Firmware-Level Erase
- Action: Run ATA Secure Erase or NVMe Sanitize using your SSD manufacturer's tool, then reinstall the operating system for the buyer
Decommissioning an Office Server
- Drive type: Likely HDD (many servers still use spinning disks for bulk storage), may also have SSDs for boot/cache
- Sensitivity: Medium to high — customer databases, employee records, financial data
- Reuse: Depends on your plan (repurpose internally vs. dispose)
- Compliance: Likely yes — most businesses with servers handle regulated data
- Flowchart path: Decision 1 (YES) → Decision 2 (HDD and/or SSD) → Decision 3H/3S (Medium) → Decision 4H-Med/4S-Med (YES) → Endpoint E (HDD) or Endpoint J (SSD): Verified Erase with Certificate
- Action: Use BitRaser or equivalent professional software. Run verified overwrite on HDDs, firmware erase on SSDs. Archive certificates with your IT asset disposal records.
Recycling Old Office PCs
- Drive type: Mixed — older PCs may have HDDs, newer ones likely have SSDs
- Sensitivity: Medium — work documents, email caches, login credentials
- Reuse: No (drives go to recycler with the machines)
- Compliance: Depends on your industry
- Flowchart path for HDD: → Decision 3H (Medium) → Decision 4H-Med → Endpoint E or F depending on compliance needs
- Flowchart path for SSD: → Decision 3S (Medium) → Decision 4S-Med → Endpoint J or H depending on compliance needs
- Action: Wipe every drive before it leaves your building. Even if the recycler promises data destruction, do not rely on a third party when you can verify it yourself. Batch processing with bootable tools like ShredOS or BitRaser speeds up high-volume wipes.
Disposing of Classified Government Data
- Drive type: Any
- Sensitivity: High — classified, top-secret, or controlled unclassified information
- Reuse: No
- Compliance: Mandatory — CMMC, agency-specific directives, potentially ITAR/EAR
- Flowchart path: Decision 1 → Decision 2 → Decision 3H or 3S (High) → Endpoint B (HDD) or Endpoint G (SSD): Physical Destruction
- Action: Follow your agency's specific destruction requirements. For HDDs, degauss then shred. For SSDs, shred or disintegrate. Use a NIST-listed or NSA-approved destruction service. Document everything with chain-of-custody records.
Mapping the Flowchart to Your Policy
This flowchart is a starting point — not a replacement for a formal media sanitization policy. A complete policy documents:
- Who is authorized to perform sanitization
- What tools and methods are approved for each drive type and sensitivity level
- When sanitization must occur (end of lease, employee departure, hardware failure, etc.)
- How results are verified and documented
- Where certificates and chain-of-custody records are stored
- How long records are retained
Use this flowchart as the decision logic within that policy. When someone in your organization needs to sanitize a drive, they should be able to walk through these decision points and arrive at a clear, documented answer.
For a comprehensive overview of erasure methods, tools, and techniques, see our complete guide to wiping a hard drive and our best data erasure software roundup.
Frequently Asked Questions
How do I decide between wiping and physically destroying a drive?
Start with whether the drive is functional. If it powers on, responds to commands, and has no hardware faults, software-based sanitization is the most cost-effective option. If the drive is dead, clicking, or unresponsive, no software can reach the data — physical destruction is the only reliable path. Data sensitivity also plays a role: classified or top-secret data often requires physical destruction regardless of drive condition.
What NIST 800-88 sanitization level do I need?
It depends on data sensitivity and what happens to the drive afterward. Clear is appropriate for low-sensitivity data on drives staying within your organization. Purge is required when drives leave your control or contain sensitive data — it protects against laboratory-level recovery. Destroy is reserved for classified or highly regulated data where no risk of recovery is acceptable.
Can I use the same sanitization method for HDDs and SSDs?
No. HDDs and SSDs store data in fundamentally different ways. Overwriting works for HDDs because the write head physically replaces data on the platter. SSDs use wear leveling and over-provisioning, so overwriting through the operating system cannot reach all stored data. SSDs require firmware-level commands like ATA Secure Erase or NVMe Sanitize.
Do I need a certificate of data erasure?
If your organization operates under HIPAA, PCI DSS, GDPR, SOX, CMMC, or similar regulations, you likely need documented proof of sanitization. Even if not legally required, a certificate of erasure protects you in the event of a data breach investigation by proving you followed proper procedures. Professional erasure tools like BitRaser generate these certificates automatically.
What is the fastest way to sanitize a drive?
For SSDs, crypto erase on a self-encrypting drive completes in under a second. ATA Secure Erase and NVMe Sanitize typically finish within one to five minutes. For HDDs, a single-pass overwrite is the fastest software method, but speed depends on drive capacity — a 1 TB HDD takes roughly two to four hours at typical write speeds.
Is a factory reset the same as media sanitization?
No. A factory reset (Windows Reset This PC, macOS Erase All Content) reinstalls the operating system and removes user files, but it does not perform a full overwrite or firmware-level erase. Data recovery software can often retrieve files after a factory reset. A proper sanitization method meeting NIST 800-88 Clear or Purge level is required for actual data destruction.
How do I sanitize a drive I want to keep using?
Choose a non-destructive method. For HDDs, a single-pass overwrite at Clear level is sufficient for most purposes. For SSDs, ATA Secure Erase or NVMe Sanitize resets the drive to factory condition without harming it. Both methods leave the drive fully functional afterward. Avoid physical destruction methods if you want to keep the drive — that should go without saying, but it comes up more often than you would expect.
What should I do with drives containing classified or top-secret data?
Classified data typically requires Destroy-level sanitization per NIST 800-88. This means physical destruction — shredding, disintegration, or incineration — that renders the media completely unusable. Some agencies accept Purge for certain classification levels, but Destroy is the safest default. Always check your specific agency or regulatory requirements before proceeding.
Does this flowchart apply to USB flash drives and memory cards?
The same principles apply. USB flash drives and SD cards use flash memory similar to SSDs, so overwriting alone is unreliable. Firmware-level erase commands are generally not available for removable flash media, which means Purge-level sanitization is difficult to achieve. For sensitive data on flash media, physical destruction is often the most practical option.
How often should I review my media sanitization process?
Review your sanitization procedures at least annually, or whenever you adopt new storage technologies, change compliance requirements, or update your data classification policy. The release of NIST 800-88 Rev. 2 in September 2025 is a good reason to review — the updated guidance covers NVMe drives and modern flash storage that Rev. 1 did not fully address.
The Bottom Line
Match your sanitization method to the drive type, data sensitivity, and compliance requirements — not a one-size-fits-all approach. Walk through each decision point in the flowchart, and you will land on the right NIST 800-88 level every time. Start with our complete wiping guide for step-by-step instructions on whichever method your situation calls for.
Last updated: February 2026. We regularly review and update our guides to ensure accuracy.
Sources:
- NIST Special Publication 800-88 Revision 2: Guidelines for Media Sanitization. https://csrc.nist.gov/pubs/sp/800/88/r2/final
- NIST Special Publication 800-88 Revision 1: Guidelines for Media Sanitization. https://csrc.nist.gov/pubs/sp/800/88/r1/final
- IEEE 2883-2022: Standard for Sanitizing Storage. https://standards.ieee.org/ieee/2883/10277/
- NVMe Specification: Sanitize Command. https://nvmexpress.org/specifications/
- ATA/ATAPI Command Set (ACS-4): Security Feature Set. https://www.t13.org/