Skip to main content
← All controls
MP-7 / A.8.3.3 / CIS-10.3 NIST SP 800-53 Rev 5

USB / removable media policy

Demonstrate that the organization has implemented and enforces a documented removable media policy that controls device authorization, restricts usage through technical safeguards, and monitors compliance.

Description

What this control does

This control establishes and enforces an organizational policy governing the use of USB drives, external hard drives, optical media, and other removable storage devices on enterprise systems. It typically defines approved device types, registration/authorization workflows, technical restrictions (such as read-only access or device whitelisting), and procedures for scanning media for malware before use. The policy reduces the risk of data exfiltration, malware introduction, and unauthorized data transfers by standardizing how portable media interacts with the corporate environment.

Control objective

What auditing this proves

Demonstrate that the organization has implemented and enforces a documented removable media policy that controls device authorization, restricts usage through technical safeguards, and monitors compliance.

Associated risks

Risks this control addresses

  • Malware infection via contaminated USB drives or external media introduced from untrusted environments
  • Unauthorized exfiltration of sensitive data by copying files to personal removable storage devices
  • Introduction of unlicensed or pirated software via optical media or USB drives, creating legal and security exposure
  • Data leakage through lost or stolen removable media containing unencrypted organizational information
  • Insider threats leveraging unrestricted removable media access to transfer intellectual property or confidential records
  • Compromise of air-gapped or isolated systems through physical delivery of infected removable devices
  • Unauthorized installation of hardware keyloggers or malicious devices disguised as USB peripherals

Testing procedure

How an auditor verifies this control

  1. Obtain and review the current removable media and USB device policy document, noting scope, authorized device types, approval processes, and technical enforcement requirements.
  2. Identify the technical controls deployed to enforce the policy, such as endpoint protection platforms, device control software, Group Policy Objects, or mobile device management (MDM) solutions.
  3. Select a representative sample of workstations and servers across departments and extract endpoint device control configuration settings or Group Policy reports.
  4. Verify that unauthorized removable media is blocked or restricted by attempting to connect an unapproved USB drive to sampled endpoints and documenting the system response.
  5. Review access logs or device control event logs for a recent period to identify any USB or removable media insertion events, noting approved versus blocked attempts.
  6. Examine the device authorization register or whitelist to confirm that approved removable media are documented with device IDs, owners, business justification, and approval dates.
  7. Interview IT administrators and a sample of end users to assess awareness of the removable media policy and understanding of procedures for requesting device authorization.
  8. Test incident response records for any security events related to removable media (malware detection, unauthorized data transfer) to verify detection and remediation processes are followed.
Evidence required Collect the signed removable media policy document, endpoint device control configuration exports (Group Policy settings, EDR/DLP rule screenshots), device authorization register or whitelist spreadsheet, device control event logs showing blocked and allowed media events for the audit period, screenshots of test attempts with unauthorized devices, and any incident tickets or forensic reports involving removable media security events.
Pass criteria The control passes if a documented removable media policy exists, technical controls are configured and enforced on sampled endpoints to block or restrict unauthorized devices, an approval and registration process is in place with evidence of active use, and logs demonstrate effective monitoring and enforcement.

Where this control is tested

Audit programs including this control