A data center decommission is one of the most logistically complex IT projects an organization can undertake. Whether you're consolidating two facilities into one, migrating to the cloud, or shutting down an aging on-premises environment, the decommission phase involves hundreds or thousands of individual assets, multiple vendors, tight timelines, and serious data security obligations.
Done well, a decommission protects your organization from data breach risk, recovers residual value from functional equipment, and produces clean documentation for your records. Done poorly, it creates security liability, compliance exposure, and operational disruption.
This checklist covers every phase of a professional data center decommission.
Phase 1: Planning & Scoping (6–12 Weeks Out)
Define scope and stakeholders
- Identify which systems, racks, and physical areas are in scope
- Identify all stakeholders: IT, security, legal/compliance, facilities, finance
- Confirm the decommission timeline and any hard deadlines (lease expiration, data migration cutover, etc.)
Review data classification and compliance requirements
- What categories of data resided in this environment? (PII, PHI, PCI data, financial records, classified information?)
- What regulatory requirements apply? (HIPAA, PCI DSS, FISMA, SOX, state privacy laws?)
- What data destruction standard is required? (NIST 800-88 Purge vs. Destroy?)
- Are on-site witnessed destruction or chain-of-custody requirements mandated?
Confirm data migration is complete
- Verify that all workloads have been migrated off systems in scope
- Confirm backups have been validated at the destination
- Get written sign-off from system owners before any hardware is touched
Phase 2: Asset Inventory
Conduct a physical hardware audit
- Walk every rack, cage, and storage room in scope
- Catalog every asset: make, model, serial number, asset tag, and current rack/location
- Do not rely solely on CMDB or asset management records — they are rarely 100% accurate for production environments
Identify storage devices requiring data destruction
- Flag every device with internal or attached storage: servers (including all drives), NAS/SAN arrays, tape libraries, workstations, laptops
- Note drive types (HDD vs. SSD) and quantities — this affects the appropriate destruction method and cost
Assess remarketing potential
- Identify equipment under 5 years old or with known market demand
- Note manufacturer and model for equipment that may qualify for vendor buyback programs
Phase 3: Provider Selection & Engagement
Identify required certifications
- Based on your data classification review, determine required certifications: NAID AAA, R2v3, ISO 14001, e-Stewards, SOC 2
- If healthcare data is involved, confirm BAA capability
Engage your ITAD provider
- Provide asset inventory and scope for quotation
- Confirm destruction methods for each asset category
- Establish documentation requirements (per-device certificates, reconciliation report)
- Agree on timeline, logistics, and any on-site requirements
Phase 4: Data Destruction
Prioritize by sensitivity
- Begin with highest-sensitivity systems: storage arrays, backup tapes, servers holding regulated data
- Maintain chain-of-custody documentation throughout
Apply the appropriate method by media type
- HDDs: NIST 800-88-compliant overwrite (Purge) or physical shredding
- SSDs: Cryptographic erasure or physical shredding — not multi-pass overwrite
- Tape media: Degaussing followed by physical destruction
- Encrypted drives: Key destruction (crypto erase) is acceptable if the drive was encrypted throughout its lifecycle
Witnessed destruction for high-sensitivity assets
- For regulated environments, consider requiring an authorized representative to witness destruction on-site or at the provider's facility
- Obtain per-device certificates of destruction before equipment leaves the facility
Phase 5: Logistics & Physical Removal
- Schedule removal to minimize impact on any remaining live systems
- Ensure all equipment is labeled and tracked from rack to transport vehicle
- Use tamper-evident seals or locked transport containers for storage media in transit
- Confirm transport chain-of-custody documentation is maintained to the final disposition point
Phase 6: Asset Disposition — Remarketing & Recycling
- Route functional assets to certified resale channels to recover value
- Route end-of-life assets to R2- or e-Stewards-certified recycling facilities
- Confirm zero-landfill handling for all e-waste
- Document disposition outcome for every asset in scope
Phase 7: Documentation & Closeout
Collect and review the full documentation package
- Asset manifest: Complete list of every device collected with serial numbers and condition
- Certificates of data destruction: Per-device, specifying method and technician
- Recycling certificates: Confirming responsible e-waste handling
- Remarketing report: Documenting any assets resold and value recovered
- Reconciliation report: Tying every asset to its final disposition outcome
Final site verification
- Walk the decommissioned space to confirm nothing was missed
- Verify all network connections, power drops, and cabling have been properly addressed
- Formally close out with facilities management