{
  "title": "How to Create an Exceptions and Approval Workflow for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.21 Compliant Portable Device Use",
  "date": "2026-04-23",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-create-an-exceptions-and-approval-workflow-for-nist-sp-800-171-rev2-cmmc-20-level-2-control-acl2-3121-compliant-portable-device-use.jpg",
  "content": {
    "full_html": "<p>Controlling and approving portable device use is a common stumbling block for small businesses pursuing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance—this post delivers a practical, step-by-step exceptions and approval workflow you can implement today to make AC.L2-3.1.21 auditable, enforceable, and operationally realistic.</p>\n\n<h2>Overview and objectives</h2>\n<p>AC.L2-3.1.21 (NIST 3.1.21) requires that organizations control the use of portable storage devices to prevent unauthorized data transfer and malware introduction. The key objectives of an exceptions and approval workflow are: a) establish a deny-by-default posture for removable media; b) provide a documented, auditable path for authorized use; c) ensure technical controls (encryption, endpoint controls, logging) are applied; and d) limit risk through time-limited, reviewed exceptions. For Compliance Framework implementations, this means integrating policy, IT controls, and documented risk acceptance into your formal compliance artifacts (policy library, POA&M, CMDB/asset register).</p>\n\n<h2>Designing the exceptions and approval workflow</h2>\n<p>Start with a one-page policy stating removable media is prohibited except by approved exception. Then create an approval workflow with these elements: request intake (ITSM ticket or form), risk justification (purpose, data classification, required fields), technical vetting (IT security verifies encryption, anti-malware, asset tagging), managerial approval (supervisor + ISSO), and issuance (whitelisting device serial number or issuing corporate device). Required form fields: requester identity, business justification, data classification (e.g., FCI/CDI), device type and serial, duration (expiry), compensating controls, and signatures. Make the workflow auditable by assigning a unique exception ID and storing approvals and attachments in your ticketing system (ServiceNow, Jira Service Management, or a secured SharePoint library).</p>\n\n<h3>Approval matrix and roles</h3>\n<p>Define a clear approval matrix: low-risk (public/unclassified, short duration) may require supervisor + IT; medium-risk (internal/operational data) requires ISSO approval and ITD technical controls; high-risk (CDI/FCI or contractor access) requires CISO/authorizing official sign-off and documented risk acceptance. For small businesses, a two-tiered model (Manager + Security Lead) often balances control and agility—keep exceptions above a threshold (e.g., access to Controlled Unclassified Information) escalated to executive approval.</p>\n\n<h2>Technical enforcement and configuration details</h2>\n<p>Technical enforcement makes the workflow effective. Implement deny-by-default using endpoint controls: Group Policy for Windows (Computer Configuration → Policies → Administrative Templates → System → Removable Storage Access — enable \"All Removable Storage classes: Deny all access\" then create a policy exception using device whitelisting), Microsoft Intune/Endpoint Manager for mobile and modern Windows management, and Mobile Device Management (MDM) for Android/iOS. Use BitLocker for full-disk and removable drive encryption (manage-bde -status to check and manage-bde -on E: -RecoveryPassword to enable), and deploy Data Loss Prevention (DLP) policies to block copy operations for protected data. Network Access Control (NAC) can enforce posture checks and deny network access for devices without required controls. Maintain a whitelist of approved USB serial numbers and use EDR/DLP to alert on attempted use of unauthorized media, forwarding logs to your SIEM for retention and correlation.</p>\n\n<h2>Operational steps: provisioning, issuance, and revocation</h2>\n<p>When an exception is approved, follow a scripted provisioning sequence: 1) record device serial and link to employee asset record; 2) sanitize and provision device with corporate image; 3) enable encryption and anti-malware; 4) apply device certificate and MDM profile; 5) label/tag physically and digitally (asset tag, CMDB entry); 6) brief user on acceptable use and sign a user agreement; 7) set expiration and automated reminders in the ticketing system. Revocation must be equally scripted: remove whitelist entry, remotely wipe if MDM-managed, collect device physically, and log chain-of-custody. Automate expiration-based revocation to avoid forgotten exceptions.</p>\n\n<h2>Small business scenarios and real-world examples</h2>\n<p>Example 1: Field technician needing to collect diagnostic logs from an isolated OT device. Use an exception: request includes data classification (\"operational logs\"), duration (48 hours), required compensating controls (hashed device image, offline transfer to corporate ingest station), and IT configures a single-use, encrypted USB with a serial whitelist. Example 2: Engineering team transferring prototype CAD files to a supplier. Approver requires supplier NDA, encrypts files with company keys, issues a company-managed encrypted USB keyed to the engineer's machine, and logs the transfer in the project’s compliance folder. These small-business patterns use minimal tools (Intune + Azure AD + ServiceNow) but remain auditable and secure.</p>\n\n<h2>Risks of not implementing a workflow and best practices</h2>\n<p>If you omit a formal exceptions workflow you risk uncontrolled data exfiltration, malware outbreaks from unmanaged media, and audit findings that can cost DIB (Defense Industrial Base) contracts. Practical best practices: enforce deny-by-default, require device whitelisting by serial number, make exceptions time-limited and logged, require encryption and endpoint telemetry, monitor attempts (SIEM alerts), periodically review all open exceptions (quarterly), and capture exceptions in your POA&M with mitigation steps. For technical specifics, maintain GPO/Intune baselines, deploy manage-bde checks in endpoint configuration baselines (Compliance policies in Intune), and store recovery keys in a secured key escrow (Azure AD/BitLocker Recovery Keys or equivalent).</p>\n\n<h2>Compliance tips and continuous improvement</h2>\n<p>Keep the process lightweight but documented: provide exception request templates, sample justifications, and an approval SLA (e.g., 48 hours). Use automation where possible—ticket to device provisioning playbooks, expiration reminders, and SIEM-driven alerts for unauthorized device insertion. Regularly test the workflow with tabletop exercises (simulate a lost USB containing CDI) and capture lessons. Track metrics: number of exceptions, average duration, incidents tied to removable media, and time to revoke. Document each exception in your evidence folder for audits and include screenshots of approvals, device serials, and provisioning logs as artifacts.</p>\n\n<p>In summary, an effective exceptions and approval workflow for AC.L2-3.1.21 combines a clear policy, an auditable intake and approval process, technical enforcement (deny-by-default, encryption, DLP, whitelisting), and lifecycle management (provisioning, labeling, revocation, and review). For small businesses, focus on simple, automatable controls and strong documentation to reduce risk and create defensible evidence for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance.</p>",
    "plain_text": "Controlling and approving portable device use is a common stumbling block for small businesses pursuing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance—this post delivers a practical, step-by-step exceptions and approval workflow you can implement today to make AC.L2-3.1.21 auditable, enforceable, and operationally realistic.\n\nOverview and objectives\nAC.L2-3.1.21 (NIST 3.1.21) requires that organizations control the use of portable storage devices to prevent unauthorized data transfer and malware introduction. The key objectives of an exceptions and approval workflow are: a) establish a deny-by-default posture for removable media; b) provide a documented, auditable path for authorized use; c) ensure technical controls (encryption, endpoint controls, logging) are applied; and d) limit risk through time-limited, reviewed exceptions. For Compliance Framework implementations, this means integrating policy, IT controls, and documented risk acceptance into your formal compliance artifacts (policy library, POA&M, CMDB/asset register).\n\nDesigning the exceptions and approval workflow\nStart with a one-page policy stating removable media is prohibited except by approved exception. Then create an approval workflow with these elements: request intake (ITSM ticket or form), risk justification (purpose, data classification, required fields), technical vetting (IT security verifies encryption, anti-malware, asset tagging), managerial approval (supervisor + ISSO), and issuance (whitelisting device serial number or issuing corporate device). Required form fields: requester identity, business justification, data classification (e.g., FCI/CDI), device type and serial, duration (expiry), compensating controls, and signatures. Make the workflow auditable by assigning a unique exception ID and storing approvals and attachments in your ticketing system (ServiceNow, Jira Service Management, or a secured SharePoint library).\n\nApproval matrix and roles\nDefine a clear approval matrix: low-risk (public/unclassified, short duration) may require supervisor + IT; medium-risk (internal/operational data) requires ISSO approval and ITD technical controls; high-risk (CDI/FCI or contractor access) requires CISO/authorizing official sign-off and documented risk acceptance. For small businesses, a two-tiered model (Manager + Security Lead) often balances control and agility—keep exceptions above a threshold (e.g., access to Controlled Unclassified Information) escalated to executive approval.\n\nTechnical enforcement and configuration details\nTechnical enforcement makes the workflow effective. Implement deny-by-default using endpoint controls: Group Policy for Windows (Computer Configuration → Policies → Administrative Templates → System → Removable Storage Access — enable \"All Removable Storage classes: Deny all access\" then create a policy exception using device whitelisting), Microsoft Intune/Endpoint Manager for mobile and modern Windows management, and Mobile Device Management (MDM) for Android/iOS. Use BitLocker for full-disk and removable drive encryption (manage-bde -status to check and manage-bde -on E: -RecoveryPassword to enable), and deploy Data Loss Prevention (DLP) policies to block copy operations for protected data. Network Access Control (NAC) can enforce posture checks and deny network access for devices without required controls. Maintain a whitelist of approved USB serial numbers and use EDR/DLP to alert on attempted use of unauthorized media, forwarding logs to your SIEM for retention and correlation.\n\nOperational steps: provisioning, issuance, and revocation\nWhen an exception is approved, follow a scripted provisioning sequence: 1) record device serial and link to employee asset record; 2) sanitize and provision device with corporate image; 3) enable encryption and anti-malware; 4) apply device certificate and MDM profile; 5) label/tag physically and digitally (asset tag, CMDB entry); 6) brief user on acceptable use and sign a user agreement; 7) set expiration and automated reminders in the ticketing system. Revocation must be equally scripted: remove whitelist entry, remotely wipe if MDM-managed, collect device physically, and log chain-of-custody. Automate expiration-based revocation to avoid forgotten exceptions.\n\nSmall business scenarios and real-world examples\nExample 1: Field technician needing to collect diagnostic logs from an isolated OT device. Use an exception: request includes data classification (\"operational logs\"), duration (48 hours), required compensating controls (hashed device image, offline transfer to corporate ingest station), and IT configures a single-use, encrypted USB with a serial whitelist. Example 2: Engineering team transferring prototype CAD files to a supplier. Approver requires supplier NDA, encrypts files with company keys, issues a company-managed encrypted USB keyed to the engineer's machine, and logs the transfer in the project’s compliance folder. These small-business patterns use minimal tools (Intune + Azure AD + ServiceNow) but remain auditable and secure.\n\nRisks of not implementing a workflow and best practices\nIf you omit a formal exceptions workflow you risk uncontrolled data exfiltration, malware outbreaks from unmanaged media, and audit findings that can cost DIB (Defense Industrial Base) contracts. Practical best practices: enforce deny-by-default, require device whitelisting by serial number, make exceptions time-limited and logged, require encryption and endpoint telemetry, monitor attempts (SIEM alerts), periodically review all open exceptions (quarterly), and capture exceptions in your POA&M with mitigation steps. For technical specifics, maintain GPO/Intune baselines, deploy manage-bde checks in endpoint configuration baselines (Compliance policies in Intune), and store recovery keys in a secured key escrow (Azure AD/BitLocker Recovery Keys or equivalent).\n\nCompliance tips and continuous improvement\nKeep the process lightweight but documented: provide exception request templates, sample justifications, and an approval SLA (e.g., 48 hours). Use automation where possible—ticket to device provisioning playbooks, expiration reminders, and SIEM-driven alerts for unauthorized device insertion. Regularly test the workflow with tabletop exercises (simulate a lost USB containing CDI) and capture lessons. Track metrics: number of exceptions, average duration, incidents tied to removable media, and time to revoke. Document each exception in your evidence folder for audits and include screenshots of approvals, device serials, and provisioning logs as artifacts.\n\nIn summary, an effective exceptions and approval workflow for AC.L2-3.1.21 combines a clear policy, an auditable intake and approval process, technical enforcement (deny-by-default, encryption, DLP, whitelisting), and lifecycle management (provisioning, labeling, revocation, and review). For small businesses, focus on simple, automatable controls and strong documentation to reduce risk and create defensible evidence for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance."
  },
  "metadata": {
    "description": "Step-by-step guidance to build an auditable exceptions and approval workflow for portable storage device use that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AC.L2-3.1.21 requirements.",
    "permalink": "/how-to-create-an-exceptions-and-approval-workflow-for-nist-sp-800-171-rev2-cmmc-20-level-2-control-acl2-3121-compliant-portable-device-use.json",
    "categories": [],
    "tags": []
  }
}