When an organization needs to erase data from a hard drive, SSD, or any storage device, one standard comes up more than any other: NIST 800-88. Published by the U.S. National Institute of Standards and Technology, this document is the most widely referenced data erasure guideline in the world. Regulatory frameworks from HIPAA to CMMC point to it. Enterprise IT departments build their data destruction policies around it. Updated to Revision 2 in September 2025, it now addresses modern storage technologies that did not exist when the original was written.
Key Takeaways:
- NIST 800-88 defines three sanitization levels — Clear, Purge, and Destroy — each protecting against increasingly sophisticated recovery attempts
- Rev. 2 (September 2025) supersedes Rev. 1, adding specific guidance for NVMe, flash storage, and self-encrypting drives
- A single overwrite pass is sufficient for modern HDDs at the Clear level — multi-pass methods are legacy thinking
- SSDs cannot be securely erased by overwriting — they require firmware-level Purge commands like ATA Secure Erase or NVMe Sanitize
- Verification is mandatory at every sanitization level, not an optional extra step
What Is NIST 800-88?
NIST Special Publication 800-88, formally titled "Guidelines for Media Sanitization," is a document that answers a deceptively simple question: how do you erase data so it cannot be recovered?
The publication comes from NIST, a non-regulatory agency within the U.S. Department of Commerce. NIST does not enforce laws — it develops standards and guidelines that other agencies, regulations, and organizations adopt. In the case of 800-88, adoption has been enormous. Federal agencies are required to follow it. HIPAA, CMMC, FedRAMP, and PCI DSS either reference it directly or accept it as proof of compliant data destruction. International organizations — from the EU to Australia — treat it as a benchmark even when they have their own national standards.
What makes NIST 800-88 different from older erasure methods like the DoD 5220.22-M is its risk-based approach. Rather than prescribing a fixed recipe (overwrite three times, verify, done), it asks you to consider:
- What type of media are you sanitizing? HDDs, SSDs, flash drives, tapes, and optical media all behave differently.
- How sensitive is the data? Public information and classified secrets require different treatment.
- What will happen to the media afterward? A drive staying within your organization needs less rigorous treatment than one being sold to a stranger.
- What recovery capabilities might an adversary have? A casual buyer with free recovery software is a different threat than a nation-state laboratory.
These questions lead you to one of three sanitization levels: Clear, Purge, or Destroy.
The Three Sanitization Levels
The core of NIST 800-88 is its three-tier sanitization model. Each level protects against a progressively more capable adversary, and each requires different techniques depending on the type of storage media involved.
Clear
Clear is the baseline level. It protects against data recovery attempts using standard, readily available software tools — the kind of data recovery programs anyone can download.
For HDDs: Overwrite all addressable storage locations with a single pass of a fixed data pattern (zeros, ones, or random data). Then verify by sampling sectors to confirm the pattern is present. That is it. One pass. NIST research has confirmed that modern drive densities make single-pass overwriting sufficient — the idea that you need multiple passes is a holdover from 1990s drive technology when bit density was low enough that residual magnetic signals could theoretically be detected.
For SSDs: A single-pass overwrite can meet Clear, but with a critical caveat. Due to wear leveling and over-provisioning, the overwrite may not reach every physical memory cell. Clear-level overwriting on an SSD protects against casual recovery, but it should not be relied upon for sensitive data leaving your organization. For SSDs, Purge is the appropriate minimum when the drive changes hands.
For other media: Flash drives, memory cards, and embedded storage generally follow the same logic as SSDs. Tapes require overwriting the entire tape including headers and trailers.
When to use Clear: The drive is staying within your organization and being reassigned to another employee or repurposed internally. The data is not highly classified or regulated. You want a quick, straightforward process using basic tools.
Purge
Purge protects against laboratory-level recovery attempts — attacks using specialized equipment, signal-processing techniques, or advanced forensic methods that go well beyond what commercial recovery software can do.
For HDDs: Purge can be achieved through overwriting (same as Clear) or through the ATA Secure Erase command, which instructs the drive's firmware to erase all data including reallocated sectors that a standard overwrite might miss. ATA Secure Erase operates at the firmware level and can reach areas of the drive that are not addressable through normal I/O operations.
For SSDs: This is where Purge becomes essential. Because wear leveling distributes writes across flash cells unpredictably, and over-provisioned areas are invisible to the operating system, overwriting simply cannot reach all data on an SSD. Purge-level sanitization for SSDs requires firmware-level commands:
- ATA Secure Erase — instructs the SSD controller to erase all cells, including over-provisioned and reallocated areas
- ATA Enhanced Secure Erase — a more thorough variant that also resets cells to their factory default state
- NVMe Sanitize (Block Erase) — the NVMe equivalent, which erases all user data areas on the drive
- NVMe Sanitize (Crypto Erase) — destroys the encryption key on a self-encrypting drive, rendering all data cryptographically unrecoverable
- Cryptographic Erase — for self-encrypting drives (SEDs), destroying the media encryption key makes all data permanently unreadable, even if the raw flash contents could theoretically be extracted
When to use Purge: The drive is leaving your organization — being sold, donated, recycled, or returned to a lessor. The data includes personally identifiable information, financial records, health records, or business-confidential material. A regulatory framework (HIPAA, GDPR, PCI DSS) applies to the data.
Destroy
Destroy renders the storage media physically unusable and data unrecoverable by any known technique, regardless of resources or expertise.
Accepted destruction methods include:
- Disintegration — reducing the media to small particles using an industrial disintegrator
- Incineration — burning the media at temperatures sufficient to destroy the storage substrate
- Shredding — cutting the media into pieces small enough that data cannot be reconstructed from fragments
- Degaussing — exposing magnetic media (HDDs, tapes) to a powerful magnetic field that disrupts the magnetic domains storing data. Note that degaussing has no effect on SSDs or flash media because they do not store data magnetically.
For SSDs and flash media, physical destruction must address all individual memory chips. Simply snapping a circuit board in half is not sufficient — each NAND flash chip potentially holds recoverable data.
When to use Destroy: The data is classified, involves national security, or carries extreme consequences if disclosed. The drive has failed and cannot be sanitized through software. You have no intention of reusing the media. Regulatory or contractual obligations specifically require physical destruction.
Bottom Line: Most individuals and businesses should target Purge-level sanitization. Clear is acceptable for internal drive reassignment. Destroy is reserved for classified data or failed drives. Match the level to the data sensitivity and where the drive is going — not to an arbitrary number of overwrite passes.
What Changed in Rev. 2
NIST published Revision 1 of SP 800-88 in December 2014. For over a decade, Rev. 1 served as the definitive reference. But storage technology evolved dramatically — NVMe drives went from emerging technology to standard equipment, SSD capacities surpassed HDDs, and self-encrypting drives became commonplace. Rev. 2, published in September 2025, brings the standard up to date.
Here are the key changes:
Expanded Coverage of Modern Storage Technologies
Rev. 1 mentioned SSDs but offered limited implementation detail. Rev. 2 provides specific guidance for NVMe drives, eMMC, UFS, and other flash-based storage that has become standard in everything from laptops to data center servers. It spells out which firmware commands qualify as Clear versus Purge for each interface type.
Alignment with IEEE 2883
IEEE 2883, published in 2022, was the first erasure standard built from the ground up for modern storage. Rev. 2 of NIST 800-88 aligns its terminology and procedures with IEEE 2883, creating a more consistent framework. Organizations following NIST 800-88 Rev. 2 will find their practices compatible with IEEE 2883 requirements — an important consideration as IEEE 2883 appears in more procurement specifications.
Clearer Decision Framework
Rev. 2 includes updated decision flowcharts that walk you through the sanitization selection process. These flowcharts help you move from "what kind of data do I have?" to "which sanitization method should I use?" without needing to interpret ambiguous passages in the standard. The flowcharts account for media type, data sensitivity classification, and intended media disposition (reuse, transfer, or disposal).
Strengthened Verification Requirements
Verification was already part of Rev. 1, but Rev. 2 places greater emphasis on it and provides more detailed verification procedures. For Purge-level sanitization using firmware commands, Rev. 2 specifies what constitutes acceptable verification — for example, reading back sectors to confirm they contain the expected pattern, or confirming that the drive firmware reports successful sanitization completion.
Cryptographic Erase Clarification
Rev. 1 acknowledged cryptographic erase but left organizations uncertain about when it qualified as Purge versus Clear. Rev. 2 clarifies: cryptographic erase qualifies as Purge when the self-encrypting drive meets specific requirements — the encryption must have been active since the drive was provisioned, the encryption algorithm must meet current NIST standards (AES-256 or equivalent), and the key destruction must be verifiable. If these conditions are not met, cryptographic erase may only qualify as Clear.
Updated Guidance on Flash Media Wear Leveling
Rev. 2 provides a more nuanced treatment of wear leveling and its impact on sanitization. It acknowledges that overwriting alone is unreliable for flash-based media and strengthens the recommendation that SSD sanitization should default to Purge-level firmware commands rather than Clear-level overwriting.
Choosing the Right Sanitization Level
The decision is not as complicated as it might seem. Ask yourself three questions:
1. How sensitive is the data?
If it is low-sensitivity data (non-confidential documents, system files, software installations) and the drive is staying within your organization, Clear is sufficient. If the data includes any personal, financial, health, or proprietary information, start at Purge. If it is classified or carries severe consequences if exposed, use Destroy.
2. Where is the drive going?
- Staying in your organization (new user, new role) = Clear is acceptable
- Leaving your organization (sold, donated, recycled, returned) = Purge minimum
- Disposal with no reuse = Destroy
3. What type of drive is it?
- HDD: Overwriting (Clear) or ATA Secure Erase (Purge) both work. A single-pass overwrite meets Clear; Secure Erase meets Purge.
- SSD (SATA): Use ATA Secure Erase or Enhanced Secure Erase for Purge. Do not rely on overwriting for anything beyond Clear.
- SSD (NVMe): Use NVMe Sanitize (Block Erase or Crypto Erase) for Purge. NVMe Format is a weaker option and may only qualify as Clear depending on the implementation.
- Self-encrypting drive: Cryptographic erase qualifies as Purge if the encryption met the conditions described in Rev. 2. Otherwise, use a firmware-level erase.
- Failed or inaccessible drive: If the drive cannot execute software commands, Destroy is your only option.
For a visual guide to this decision process, see our data erasure standards overview, which includes a comparison chart across all major standards.
Which Tools Support NIST 800-88?
Not every erasure tool can perform every sanitization level. Here is what to look for and which tools meet the mark.
For Clear-Level HDD Sanitization
Any tool that performs a verified single-pass overwrite satisfies Clear. Free options include:
- DBAN — boots from USB, overwrites entire HDDs. Free, open-source, but limited to HDDs and does not generate compliance certificates.
- ShredOS/nwipe — the modern successor to DBAN. Free, open-source, boots from USB, supports verification. A solid choice for Clear-level HDD wiping with no budget.
These tools are effective for HDDs but cannot issue the firmware-level commands needed for SSD Purge.
For Purge-Level Sanitization (HDD and SSD)
Purge requires tools that can issue ATA Secure Erase, NVMe Sanitize, or equivalent firmware commands:
- BitRaser Drive Eraser — supports both Clear and Purge across HDDs and SSDs. Generates tamper-proof certificates of erasure that meet audit requirements for HIPAA, GDPR, PCI DSS, and CMMC. Reports compliance with NIST 800-88 and IEEE 2883. This is the most complete option for organizations that need documentation.
- Parted Magic — a bootable Linux environment that includes ATA Secure Erase support for SSDs. Lower cost than BitRaser, but without automated compliance reporting.
- Manufacturer utilities — Samsung Magician, Western Digital SSD Dashboard, Intel Memory and Storage Tool, and similar vendor-provided tools can issue secure erase commands to their own drives. Free, but limited to that manufacturer's hardware.
What About Certificates?
NIST 800-88 Rev. 2 emphasizes documentation. A certificate of data erasure records what was erased, when, by whom, using what method, and whether verification passed. For regulated industries, these certificates are the difference between "we wiped it, trust us" and auditable proof of compliance. BitRaser generates these automatically. Free tools generally do not — you would need to document the process manually.
For a complete breakdown of features, pricing, and supported standards across all major tools, see our best data erasure software roundup.
What This Means for You
NIST 800-88 can seem overwhelming when you read the full publication, but the practical takeaways are straightforward.
If You Are a Home User
You probably do not need to think about NIST 800-88 by name. But the principles still apply. Before selling, donating, or recycling a computer, you need to erase your data — not just delete files or reset the OS. For an HDD, a single-pass overwrite using a free tool like DBAN is sufficient. For an SSD, use your manufacturer's secure erase utility or a tool like Parted Magic that can issue firmware-level commands. Our complete guide to wiping a hard drive walks you through both scenarios.
If You Run a Business
You should have a written media sanitization policy that references NIST 800-88. When decommissioning employee laptops, retiring servers, or returning leased equipment, every drive should be Purge-level sanitized with a certificate documenting the process. This protects your business in two ways: it prevents data breaches from improperly wiped drives, and it gives you documentation to defend against liability claims. The cost of professional erasure software is trivial compared to the cost of a data breach or regulatory fine.
If You Work in a Regulated Industry
NIST 800-88 Rev. 2 is your primary reference. Build your media sanitization procedures around its three-tier model. Use tools that generate certificates referencing the specific NIST standard. Train staff on the difference between Clear, Purge, and Destroy, and document which level applies to which data categories. When auditors ask about your data destruction practices, you want to hand them a binder of erasure certificates — not a verbal assurance.
If You Handle SSDs
This is the single most actionable point in the entire standard: do not rely on overwriting to erase an SSD. Wear leveling means that even a "full overwrite" leaves data scattered across flash cells that the overwrite never touched. Use firmware-level Purge commands — ATA Secure Erase, NVMe Sanitize, or cryptographic erase on self-encrypting drives. Our SSD secure erase guide provides step-by-step instructions for SATA and NVMe drives.
Frequently Asked Questions
What is NIST 800-88?
NIST Special Publication 800-88 is a set of guidelines published by the U.S. National Institute of Standards and Technology that tells organizations how to sanitize storage media — hard drives, SSDs, flash drives, tapes, and other devices — so that data cannot be recovered. It is the most widely referenced data erasure standard in the world.
What are the three sanitization levels in NIST 800-88?
NIST 800-88 defines three levels: Clear (protects against recovery with standard software tools), Purge (protects against laboratory-level recovery using specialized equipment), and Destroy (renders media physically unusable). The right level depends on data sensitivity and whether you plan to reuse the drive.
What changed in NIST 800-88 Rev. 2?
Rev. 2, published in September 2025, adds detailed guidance for modern storage technologies like NVMe SSDs and flash media. It strengthens verification requirements, aligns with IEEE 2883, introduces clearer decision flowcharts, and acknowledges cryptographic erase as a valid Purge method for self-encrypting drives when specific conditions are met.
How many overwrite passes does NIST 800-88 require?
For modern hard drives, NIST 800-88 requires only a single overwrite pass for Clear-level sanitization. The outdated idea that multiple passes are needed comes from older drive technology. For SSDs, overwriting is not recommended — firmware-level commands like ATA Secure Erase or NVMe Sanitize are required instead.
Does NIST 800-88 apply to SSDs?
Yes. NIST 800-88 covers SSDs, but the guidance differs from HDDs. Because SSDs use wear leveling and over-provisioning, overwriting alone cannot reach all stored data. The standard recommends Purge-level sanitization using firmware commands such as ATA Secure Erase, NVMe Sanitize (Block Erase or Crypto Erase), or cryptographic erase for self-encrypting drives.
Is NIST 800-88 required by law?
NIST 800-88 is not a law itself — it is a guideline. However, many regulations and frameworks reference it or require equivalent measures. HIPAA, CMMC, FedRAMP, and most U.S. federal agency policies either mandate or strongly recommend following NIST 800-88. GDPR and PCI DSS require appropriate data destruction without naming a specific standard, and NIST 800-88 is the most widely accepted way to demonstrate compliance.
What is the difference between Clear and Purge in NIST 800-88?
Clear protects against data recovery using readily available software tools — a standard data recovery program would not be able to retrieve the data. Purge goes further, protecting against laboratory-level attacks using specialized equipment like electron microscopes or signal-processing techniques. Purge typically requires firmware-level commands for SSDs, while Clear can be achieved through overwriting on HDDs.
Does NIST 800-88 replace the DoD 5220.22-M standard?
Yes. The U.S. Department of Defense itself no longer references DoD 5220.22-M for media sanitization and instead defers to NIST 800-88. The DoD three-pass overwrite method is obsolete. Organizations still using DoD 5220.22-M are following outdated guidance that was designed for drive technology from the 1990s.
Do I need special software to follow NIST 800-88?
For Clear-level HDD sanitization, free tools like DBAN or ShredOS can perform a single-pass overwrite. For Purge-level sanitization — especially on SSDs — you need software that can issue firmware-level erase commands and ideally generate a certificate of erasure. Professional tools like BitRaser support both Clear and Purge levels with compliance reporting.
How do I verify that data erasure met the NIST 800-88 standard?
Verification is a required step in NIST 800-88, not optional. For Clear, verification means sampling sectors after overwriting to confirm the overwrite pattern is present. For Purge, verification depends on the method — checking that the drive firmware reports successful completion, or reading back sectors to confirm they contain the expected pattern. Professional erasure software automates this verification and documents the results in a certificate.
The Bottom Line
NIST 800-88 Rev. 2 is the data erasure standard most organizations should follow. Use Clear for internal drive reassignment, Purge when drives leave your control, and Destroy for classified data or failed drives. One overwrite pass handles HDDs. SSDs need firmware-level commands. Always verify, always document. Start with our guide to wiping a hard drive for step-by-step instructions.
Last updated: February 2026. We regularly review and update our guides to ensure accuracy.
Sources:
- NIST Special Publication 800-88 Rev. 2, "Guidelines for Media Sanitization." https://csrc.nist.gov/publications/detail/sp/800-88/rev-2/final
- NIST Special Publication 800-88 Rev. 1, "Guidelines for Media Sanitization" (December 2014). https://csrc.nist.gov/publications/detail/sp/800-88/rev-1/final
- IEEE 2883-2022, "IEEE Standard for Sanitizing Storage." https://standards.ieee.org/ieee/2883/10277/
- NIST Computer Security Resource Center. https://csrc.nist.gov/
- National Security Agency, "Media Destruction Guidance." https://www.nsa.gov/Portals/75/documents/resources/everyone/media-destruction/pm9-12.pdf