🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Endpoints for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SC.L2-3.13.12: Technical Implementation Checklist to Block Remote Webcam/Mic Activation and Show Device Status

Practical, platform-specific steps and checks to meet NIST SP 800-171 / CMMC 2.0 SC.L2-3.13.12 by preventing remote camera/microphone activation and providing visible device status for endpoints.

April 04, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, technical checklist for implementing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control SC.L2-3.13.12 on endpoints — specifically how to block unauthorized remote activation of webcams and microphones and how to ensure device status is visible and auditable across Windows, macOS, Linux, and mobile devices in a small-business environment.

Why this control matters

SC.L2-3.13.12 is about preventing covert audio/video capture of Controlled Unclassified Information (CUI) or other sensitive data and ensuring users and defenders can see when those sensors are active. Failure to implement this control risks eavesdropping, data exfiltration, regulatory non‑compliance, loss of client trust, and potential contract penalties for government or defense-related small businesses. Remote webcam/mic activation is a common technique used by threat actors and poorly hardened collaboration tools, so technical controls and visibility are essential.

Technical implementation checklist (high level)

Use this checklist as a baseline; adjust for your environment and document exceptions. Apply defense-in-depth: policy, configuration, device hardening, monitoring, and user awareness.

  1. Inventory: Identify all endpoints with cameras/microphones (built-in, USB, virtual). Use Active Directory/MDM inventory or a discovery script (PowerShell for Windows, system_profiler for macOS, lsusb/udevadm for Linux).
  2. Policy & MDM: Enforce camera/microphone access policies via GPO/Intune/MDM for Windows/macOS/iOS/Android. Block camera globally by default; allow only on approved devices/users/apps.
  3. Device installation controls: Prevent installation of new camera drivers (Windows Device Installation Restrictions / MDM) and deny unknown USB video/audio device classes.
  4. Kernel/module controls (Linux/macOS): Blacklist camera kernel drivers (e.g., uvcvideo on Linux) where hardware removal isn't practical. Remove or restrict access to /dev/video* and /dev/snd/* with udev rules and group permissions.
  5. Virtual devices: Detect and block virtual camera software (OBS virtual camera, ManyCam) using application allowlisting (AppLocker/WDAC/Intune/MDM) or by blocking the associated drivers/services.
  6. EDR/SIEM monitoring: Create detections for processes accessing media device APIs or opening device files; log and alert on unexpected access. Use auditd/OS-level auditing to record opens on /dev/video* and /dev/snd/*.
  7. Visible indicators: Ensure OS-level indicators are enabled (Windows 10/11 camera privacy icon, macOS green/orange dot). Where hardware indicators are absent or unreliable, implement software notifications or system tray icons driven by the monitoring stack.
  8. Physical controls and firmware: Use firmware/BIOS settings to disable on-board cameras where possible; encourage physical camera covers for high-risk roles.
  9. Testing and documentation: Test policies with a small pilot group, log results, and maintain an exceptions register with business justification and compensating controls.

Platform-specific, actionable steps and examples

Below are concrete commands and policy locations you can use — adapt these to your management stack (SCCM/Intune, JAMF, Ansible, etc.).

Windows

Inventory cameras: use PowerShell to list camera devices and PnP IDs: Get-PnpDevice -Class Camera | Format-List FriendlyName,InstanceId. Prevent installation via GPO: Computer Configuration → Administrative Templates → System → Device Installation → Device Installation Restrictions → “Prevent installation of devices that match any of these device IDs” and add Device Instance IDs from Device Manager. In Intune/Endpoint Manager: Device Configuration → Profiles → Device Restrictions → General → Camera: Block. Use AppLocker or Windows Defender Application Control (WDAC) to block unauthorized apps (virtual cameras) from running. For visibility, ensure Windows privacy indicators are enabled and create an Event Forwarding rule or SIEM correlation that alerts on processes that call media APIs (monitor via EDR integration).

macOS

Use MDM to control TCC (Privacy Preferences Policy Control) to enforce which signed apps can access camera and microphone — deny by default and allow only specific managed apps. To disable built-in camera at firmware/BIOS level is not typically available on Macs; instead, use MDM PPPC and block virtual camera driver packages. For monitoring, use osquery to query active processes and open file descriptors, or deploy an EDR that records AV device access. macOS shows a green/orange dot when camera/mic are in use — include this behavior in user training and audit checks.

Linux

To disable webcams system-wide: create a blacklist for the UVC driver: echo "blacklist uvcvideo" | sudo tee /etc/modprobe.d/disable-webcam.conf and remove loaded module: sudo modprobe -r uvcvideo. Restrict access to device nodes with udev rules: create /etc/udev/rules.d/99-webcam.rules to set ownership/group and permissions so only a specific service account can access. Monitor access with auditd by adding a rule like: -w /dev/video0 -p rwxa -k webcam-access and configure your SIEM to alert on logs with key=webcam-access. Block USB audio devices by vendor/product IDs in udev or by disabling snd_usb_audio if appropriate.

Real-world small-business scenarios

Scenario 1 — Remote workers: A 20-person engineering shop uses laptops with built-in cameras. Implement Intune device restrictions to block camera for contractors, deploy an EDR policy to alert when a camera or microphone is accessed by a non‑approved process, and require physical covers for employees handling CUI. Scenario 2 — Shared conference rooms: Lock down room systems via local admin policies, disable unnecessary virtual cameras, and configure the conferencing app to require explicit user consent per meeting. Scenario 3 — BYOD: Enforce a MAM/MDM baseline that disables camera use for unmanaged devices accessing sensitive collaboration resources and require device enrollment for camera-enabled access.

Compliance tips, best practices, and testing

Enforce least privilege (deny-by-default for camera/mic), maintain an asset inventory mapped to CUI risk, and document exceptions. Use layered controls: policy → MDM/GPO → kernel/driver controls → EDR/monitoring → user training. Regularly test with internal red-team exercises that attempt to covertly enable cameras or microphones; verify that indicators/alerts fire and that logs are complete and routed to your SIEM. Keep firmware and drivers updated to avoid vulnerabilities that allow bypasses. Finally, include this control in continuous monitoring and the organization's System Security Plan (SSP) and Plan of Actions & Milestones (POA&M) where applicable for NIST/CMMC evidence.

Summary

Meeting SC.L2-3.13.12 requires a mix of policy, platform configuration, device control, monitoring, and user awareness. For small businesses, focus first on inventory, deny-by-default MDM/GPO policies, kernel/module or driver blacklisting where appropriate, blocking virtual cameras, and deploying EDR/SIEM rules that detect and surface camera/mic activity. Test changes, document exceptions, and use visible indicators and training to ensure users and defenders can see when these sensors are active — together these steps provide practical, auditable controls that align with NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes