🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement USB and Removable Media Controls to Comply with NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.21: A Step-by-Step Guide

Practical, step-by-step guidance to implement USB and removable media controls to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AC.L2-3.1.21) requirements for protecting Controlled Unclassified Information.

•
April 18, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to implement and document USB and removable media controls to meet Compliance Framework requirements (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control AC.L2-3.1.21) with practical steps, concrete technical settings, and real-world examples for a small business.

Understand the control and define scope

AC.L2-3.1.21 requires organizations to control and limit the use of removable media to prevent unauthorized transfer of Controlled Unclassified Information (CUI). For Compliance Framework implementations you must define scope (which systems and users process CUI), classify what constitutes removable media (USB mass storage, SD cards, external HDDs, optical media, and even some Bluetooth file transfer methods), and identify the owners of devices and data flows. Document scope in your System Security Plan (SSP) and map the control to the Compliance Framework requirement set so assessors can follow your evidence trail.

Step 1 — Policy, governance, and exception process

Create or update a removable media policy that covers permitted device types, encryption requirements, authorized use cases, acceptance criteria for personal vs. company-owned media, and an exceptions procedure. Required artifacts for Compliance Framework evidence: the signed policy, a register of approved removable media (device serial numbers or asset tags), documented exception requests with business justification and compensating controls, and training records showing users understand the policy.

Practical policy elements

At minimum your policy should: (a) prohibit personal removable media for CUI, (b) require company-managed encrypted USB devices for any authorized exchange, (c) require anti-malware scanning before attachment to CUI systems, (d) mandate logging and regular audits, and (e) require removal-device sanitization (NIST SP 800-88). Tie enforcement to disciplinary and contract clauses for employees and contractors.

Step 2 — Technical controls (concrete configs)

Implement layered technical controls so policy is enforceable: endpoint DLP to block/inspect file transfers, OS/device-level blocking by device class, allowlisting corporate-approved devices, device encryption enforcement, and network controls (NAC VLANing). Examples and commands you can use right away:

# Windows: disable USB storage driver (central GPO/PowerShell)
Set-ItemProperty -Path 'HKLM:\SYSTEM\CurrentControlSet\Services\USBSTOR' -Name 'Start' -Value 4

# Windows: list USB devices
Get-PnpDevice -Class 'USB' | Where-Object { $_.Present -eq $true }

# Linux (udev): block a USB vendor/product by vendor ID
# /etc/udev/rules.d/99-usb-block.rules
SUBSYSTEM=="usb", ATTR{idVendor}=="1234", ATTR{idProduct}=="abcd", MODE="0000", RUN+="/bin/logger 'Blocked USB device 1234:abcd'"

For enterprise management use Microsoft Intune / Endpoint Configuration Manager to enforce "Removable Storage Access" policies and deploy BitLocker To Go policies via Group Policy (Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Removable Data Drives). Set encryption algorithm to XTS-AES 256 and require a password or smartcard protector for BitLocker To Go. On macOS, enforce removable media policies via MDM profiles and FileVault + MDM restrictions; on Linux, enforce udev rules and sudo/group restrictions to access /dev/sd* devices.

Allowlisting and DLP

Use allowlisting for sanctioned USB vendor/product IDs and certificate-based allowlisting for smartcard/USB tokens. Deploy an endpoint DLP product to block copy operations from CUI-designated folders to removable storage, and to quarantine or prompt for authorization if a user tries to transfer data. Configure DLP to produce alerts, quarantine files, and create tickets for exceptions so you have an audit trail.

Step 3 — Operational controls: inventory, training, and exception handling

Operationalize the technical controls by maintaining an inventory of approved removable devices (asset tag, serial, assigned user), logging assignment and return, and using a standard secure issuance process for company USB drives (pre-encrypted, UUID-logged). Provide short, role-based training that demonstrates how to use encrypted devices, how to request exceptions, and how to report lost or found media. Implement a written exception process that requires manager approval and compensating controls (e.g., temporary network isolation, supervised transfer, additional logging).

Logging, monitoring, and audit evidence

Collect and retain evidence required by the Compliance Framework: OS logs showing device attach/detach events, DLP alerts and disposition, NAC logs showing network port and VLAN assignment, BitLocker key escrow records (store in Active Directory or an enterprise key manager), and exception tickets. Configure centralized SIEM ingestion of endpoint events and set alerts for anomalies such as repeated attach/detach events, unauthorized device IDs, or bulk file copies. Preserve logs for the retention period stated in your SSP (commonly 1–3 years for CUI workflows) and produce samples during assessment.

Real-world small-business scenario

Example: a 25-person engineering firm with a single CUI project. Steps they took: (1) added a removable media policy to the employee handbook, (2) issued 10 company-managed encrypted USB sticks (asset-tagged), (3) used Intune to block all non-managed USB devices and required BitLocker To Go on approved sticks, (4) configured DLP to block outbound transfers from the CUI project folder, and (5) documented all exceptions and trained staff in a 30-minute session. After implementation they were able to produce the SSP, policy, device register, DLP alerts, and training records for their CMMC Level 2 assessment.

Risk of not implementing this control

Without these controls you face high risk of data exfiltration, malware introduction, loss of CUI, contract penalties or loss of DoD work, regulatory fines, and reputational damage. Removable media is one of the simplest vectors for unauthorized copying — attackers and negligent insiders can bypass network defenses by plugging in an inexpensive USB stick. Failure to provide documented policies, technical enforcement, and audit evidence will result in nonconformities for the Compliance Framework and likely a failed assessment.

Summary: implement a defensible combination of policy, technical enforcement (block/allowlist, encryption, DLP), operational practices (inventory, training, exceptions), and logging to meet AC.L2-3.1.21. Begin by scoping systems that process CUI, update your SSP, deploy targeted OS and MDM/GPO settings, and collect audit evidence — these steps produce both effective risk reduction and the documentation auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes