NIST Special Publication 800-171 Revision 2
Date Published: January 28th, 2021
Withdrawn on May 14, 2024. Superseded by SP 800-171 Rev. 3
Author(s): Ron Ross (NIST), Victoria Pillitteri (NIST), Kelley Dempsey (NIST), Mark Riddle (NARA), Gary Guissanie (IDA)
Note: A Class Deviation is in effect as of May 2, 2024 (DEVIATION 2024O0013). The deviation clause requires contractors, who are subject to 252.204-7012, to comply with National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 Revision 2, instead of the version of NIST SP 800-171 in effect at the time the solicitation is issued or as authorized by the contracting officer. Click Here
3.8.7: Control the use of removable media on system components.
Control Family: Maintenance
Control Type: Derived
SPRS Value: 5
SPRS Supplemental Guidance: N/A
CMMC Level(s): MP.L2-3.8.7
Top Ten Failed Requirement:
No
Referenced in:
DFARS 252.204-7012
Derived From: NIST SP 800-53r4
MP-7
NIST Supplemental Guidance:
N/A
Discussion:
In contrast to requirement 3.8.1, which restricts user access to media, this requirement restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives. Organizations can employ technical and nontechnical controls (e.g., policies, procedures, and rules of behavior) to control the use of system media. Organizations may control the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports, or disabling or removing the ability to insert, read, or write to such devices. Organizations may also limit the use of portable storage devices to only approved devices including devices provided by the organization, devices provided by other approved organizations, and devices that are not personally owned. Finally, organizations may control the use of portable storage devices based on the type of device, prohibiting the use of writeable, portable devices, and implementing this restriction by disabling or removing the capability to write to such devices.
Upon assessment, assessors must determine if-
Determine if the use of removable media on system components is controlled.
Assessors are instructed to-
Examine: [SELECT FROM: System media protection policy; system use policy; procedures addressing media usage restrictions; system security plan; rules of behavior; system design documentation; system configuration settings and associated documentation; system audit logs and records; other relevant documents or records].
Interview: [SELECT FROM: Personnel with system media use responsibilities; personnel with information security responsibilities; system or network administrators].
Test: [SELECT FROM: Organizational processes for media use; mechanisms restricting or prohibiting use of system media on systems or system components].
FURTHER DISCUSSION
Removable media are any type of media storage that you can remove from your computer or machine (e.g., CDs, DVDs, diskettes, and USB drives). Write a specific policy for removable media. The policy should cover the various types of removable media (e.g., write-once media and rewritable media) and should discuss the company’s approach to removable media. Ensure the following controls are considered and included in the policy:
limit the use of removable media to the smallest number needed; and
scan all removable media for viruses.
Example
You are in charge of IT operations. You establish a policy for removable media that includes USB drives [a]. The policy information such as:
only USB drives issued by the organization may be used; and
USB drives are to be used for work purposes only [a].
You set up a separate computer to scan these drives before anyone uses them on the network. This computer has anti-virus software installed that is kept up to date.
Potential Assessment Considerations
Are removable media allowed [a]?
Are policies and/or procedures in use to control the use of removable media [a]?
Frameworks & Controls
3.8.2: Limit access to CUI on system media to authorized users.
3.8.3: Sanitize or destroy system media containing
CUI before disposal or release for reuse.3.8.4: Mark media with necessary CUI markings and distribution limitations.
3.8.7: Control the use of removable media on system components.
3.8.8: Prohibit the use of portable storage devices when such devices have no identifiable owner.
3.8.9: Protect the confidentiality of backup CUI at storage locations.