{
  "title": "How to Implement USB and Removable Media Controls to Comply with NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.21: A Step-by-Step Guide",
  "date": "2026-04-18",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-implement-usb-and-removable-media-controls-to-comply-with-nist-sp-800-171-rev2-cmmc-20-level-2-control-acl2-3121-a-step-by-step-guide.jpg",
  "content": {
    "full_html": "<p>This post explains how to implement and document USB and removable media controls to meet Compliance Framework requirements (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control AC.L2-3.1.21) with practical steps, concrete technical settings, and real-world examples for a small business.</p>\n\n<h2>Understand the control and define scope</h2>\n<p>AC.L2-3.1.21 requires organizations to control and limit the use of removable media to prevent unauthorized transfer of Controlled Unclassified Information (CUI). For Compliance Framework implementations you must define scope (which systems and users process CUI), classify what constitutes removable media (USB mass storage, SD cards, external HDDs, optical media, and even some Bluetooth file transfer methods), and identify the owners of devices and data flows. Document scope in your System Security Plan (SSP) and map the control to the Compliance Framework requirement set so assessors can follow your evidence trail.</p>\n\n<h2>Step 1 — Policy, governance, and exception process</h2>\n<p>Create or update a removable media policy that covers permitted device types, encryption requirements, authorized use cases, acceptance criteria for personal vs. company-owned media, and an exceptions procedure. Required artifacts for Compliance Framework evidence: the signed policy, a register of approved removable media (device serial numbers or asset tags), documented exception requests with business justification and compensating controls, and training records showing users understand the policy.</p>\n\n<h3>Practical policy elements</h3>\n<p>At minimum your policy should: (a) prohibit personal removable media for CUI, (b) require company-managed encrypted USB devices for any authorized exchange, (c) require anti-malware scanning before attachment to CUI systems, (d) mandate logging and regular audits, and (e) require removal-device sanitization (NIST SP 800-88). Tie enforcement to disciplinary and contract clauses for employees and contractors.</p>\n\n<h2>Step 2 — Technical controls (concrete configs)</h2>\n<p>Implement layered technical controls so policy is enforceable: endpoint DLP to block/inspect file transfers, OS/device-level blocking by device class, allowlisting corporate-approved devices, device encryption enforcement, and network controls (NAC VLANing). Examples and commands you can use right away:</p>\n\n<pre><code># Windows: disable USB storage driver (central GPO/PowerShell)\nSet-ItemProperty -Path 'HKLM:\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR' -Name 'Start' -Value 4\n\n# Windows: list USB devices\nGet-PnpDevice -Class 'USB' | Where-Object { $_.Present -eq $true }\n\n# Linux (udev): block a USB vendor/product by vendor ID\n# /etc/udev/rules.d/99-usb-block.rules\nSUBSYSTEM==\"usb\", ATTR{idVendor}==\"1234\", ATTR{idProduct}==\"abcd\", MODE=\"0000\", RUN+=\"/bin/logger 'Blocked USB device 1234:abcd'\"\n</code></pre>\n\n<p>For enterprise management use Microsoft Intune / Endpoint Configuration Manager to enforce \"Removable Storage Access\" policies and deploy BitLocker To Go policies via Group Policy (Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Removable Data Drives). Set encryption algorithm to XTS-AES 256 and require a password or smartcard protector for BitLocker To Go. On macOS, enforce removable media policies via MDM profiles and FileVault + MDM restrictions; on Linux, enforce udev rules and sudo/group restrictions to access /dev/sd* devices.</p>\n\n<h3>Allowlisting and DLP</h3>\n<p>Use allowlisting for sanctioned USB vendor/product IDs and certificate-based allowlisting for smartcard/USB tokens. Deploy an endpoint DLP product to block copy operations from CUI-designated folders to removable storage, and to quarantine or prompt for authorization if a user tries to transfer data. Configure DLP to produce alerts, quarantine files, and create tickets for exceptions so you have an audit trail.</p>\n\n<h2>Step 3 — Operational controls: inventory, training, and exception handling</h2>\n<p>Operationalize the technical controls by maintaining an inventory of approved removable devices (asset tag, serial, assigned user), logging assignment and return, and using a standard secure issuance process for company USB drives (pre-encrypted, UUID-logged). Provide short, role-based training that demonstrates how to use encrypted devices, how to request exceptions, and how to report lost or found media. Implement a written exception process that requires manager approval and compensating controls (e.g., temporary network isolation, supervised transfer, additional logging).</p>\n\n<h2>Logging, monitoring, and audit evidence</h2>\n<p>Collect and retain evidence required by the Compliance Framework: OS logs showing device attach/detach events, DLP alerts and disposition, NAC logs showing network port and VLAN assignment, BitLocker key escrow records (store in Active Directory or an enterprise key manager), and exception tickets. Configure centralized SIEM ingestion of endpoint events and set alerts for anomalies such as repeated attach/detach events, unauthorized device IDs, or bulk file copies. Preserve logs for the retention period stated in your SSP (commonly 1–3 years for CUI workflows) and produce samples during assessment.</p>\n\n<h2>Real-world small-business scenario</h2>\n<p>Example: a 25-person engineering firm with a single CUI project. Steps they took: (1) added a removable media policy to the employee handbook, (2) issued 10 company-managed encrypted USB sticks (asset-tagged), (3) used Intune to block all non-managed USB devices and required BitLocker To Go on approved sticks, (4) configured DLP to block outbound transfers from the CUI project folder, and (5) documented all exceptions and trained staff in a 30-minute session. After implementation they were able to produce the SSP, policy, device register, DLP alerts, and training records for their CMMC Level 2 assessment.</p>\n\n<h2>Risk of not implementing this control</h2>\n<p>Without these controls you face high risk of data exfiltration, malware introduction, loss of CUI, contract penalties or loss of DoD work, regulatory fines, and reputational damage. Removable media is one of the simplest vectors for unauthorized copying — attackers and negligent insiders can bypass network defenses by plugging in an inexpensive USB stick. Failure to provide documented policies, technical enforcement, and audit evidence will result in nonconformities for the Compliance Framework and likely a failed assessment.</p>\n\n<p>Summary: implement a defensible combination of policy, technical enforcement (block/allowlist, encryption, DLP), operational practices (inventory, training, exceptions), and logging to meet AC.L2-3.1.21. Begin by scoping systems that process CUI, update your SSP, deploy targeted OS and MDM/GPO settings, and collect audit evidence — these steps produce both effective risk reduction and the documentation auditors expect.</p>",
    "plain_text": "This post explains how to implement and document USB and removable media controls to meet Compliance Framework requirements (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control AC.L2-3.1.21) with practical steps, concrete technical settings, and real-world examples for a small business.\n\nUnderstand the control and define scope\nAC.L2-3.1.21 requires organizations to control and limit the use of removable media to prevent unauthorized transfer of Controlled Unclassified Information (CUI). For Compliance Framework implementations you must define scope (which systems and users process CUI), classify what constitutes removable media (USB mass storage, SD cards, external HDDs, optical media, and even some Bluetooth file transfer methods), and identify the owners of devices and data flows. Document scope in your System Security Plan (SSP) and map the control to the Compliance Framework requirement set so assessors can follow your evidence trail.\n\nStep 1 — Policy, governance, and exception process\nCreate or update a removable media policy that covers permitted device types, encryption requirements, authorized use cases, acceptance criteria for personal vs. company-owned media, and an exceptions procedure. Required artifacts for Compliance Framework evidence: the signed policy, a register of approved removable media (device serial numbers or asset tags), documented exception requests with business justification and compensating controls, and training records showing users understand the policy.\n\nPractical policy elements\nAt minimum your policy should: (a) prohibit personal removable media for CUI, (b) require company-managed encrypted USB devices for any authorized exchange, (c) require anti-malware scanning before attachment to CUI systems, (d) mandate logging and regular audits, and (e) require removal-device sanitization (NIST SP 800-88). Tie enforcement to disciplinary and contract clauses for employees and contractors.\n\nStep 2 — Technical controls (concrete configs)\nImplement layered technical controls so policy is enforceable: endpoint DLP to block/inspect file transfers, OS/device-level blocking by device class, allowlisting corporate-approved devices, device encryption enforcement, and network controls (NAC VLANing). Examples and commands you can use right away:\n\n# Windows: disable USB storage driver (central GPO/PowerShell)\nSet-ItemProperty -Path 'HKLM:\\SYSTEM\\CurrentControlSet\\Services\\USBSTOR' -Name 'Start' -Value 4\n\n# Windows: list USB devices\nGet-PnpDevice -Class 'USB' | Where-Object { $_.Present -eq $true }\n\n# Linux (udev): block a USB vendor/product by vendor ID\n# /etc/udev/rules.d/99-usb-block.rules\nSUBSYSTEM==\"usb\", ATTR{idVendor}==\"1234\", ATTR{idProduct}==\"abcd\", MODE=\"0000\", RUN+=\"/bin/logger 'Blocked USB device 1234:abcd'\"\n\n\nFor enterprise management use Microsoft Intune / Endpoint Configuration Manager to enforce \"Removable Storage Access\" policies and deploy BitLocker To Go policies via Group Policy (Computer Configuration → Administrative Templates → Windows Components → BitLocker Drive Encryption → Removable Data Drives). Set encryption algorithm to XTS-AES 256 and require a password or smartcard protector for BitLocker To Go. On macOS, enforce removable media policies via MDM profiles and FileVault + MDM restrictions; on Linux, enforce udev rules and sudo/group restrictions to access /dev/sd* devices.\n\nAllowlisting and DLP\nUse allowlisting for sanctioned USB vendor/product IDs and certificate-based allowlisting for smartcard/USB tokens. Deploy an endpoint DLP product to block copy operations from CUI-designated folders to removable storage, and to quarantine or prompt for authorization if a user tries to transfer data. Configure DLP to produce alerts, quarantine files, and create tickets for exceptions so you have an audit trail.\n\nStep 3 — Operational controls: inventory, training, and exception handling\nOperationalize the technical controls by maintaining an inventory of approved removable devices (asset tag, serial, assigned user), logging assignment and return, and using a standard secure issuance process for company USB drives (pre-encrypted, UUID-logged). Provide short, role-based training that demonstrates how to use encrypted devices, how to request exceptions, and how to report lost or found media. Implement a written exception process that requires manager approval and compensating controls (e.g., temporary network isolation, supervised transfer, additional logging).\n\nLogging, monitoring, and audit evidence\nCollect and retain evidence required by the Compliance Framework: OS logs showing device attach/detach events, DLP alerts and disposition, NAC logs showing network port and VLAN assignment, BitLocker key escrow records (store in Active Directory or an enterprise key manager), and exception tickets. Configure centralized SIEM ingestion of endpoint events and set alerts for anomalies such as repeated attach/detach events, unauthorized device IDs, or bulk file copies. Preserve logs for the retention period stated in your SSP (commonly 1–3 years for CUI workflows) and produce samples during assessment.\n\nReal-world small-business scenario\nExample: a 25-person engineering firm with a single CUI project. Steps they took: (1) added a removable media policy to the employee handbook, (2) issued 10 company-managed encrypted USB sticks (asset-tagged), (3) used Intune to block all non-managed USB devices and required BitLocker To Go on approved sticks, (4) configured DLP to block outbound transfers from the CUI project folder, and (5) documented all exceptions and trained staff in a 30-minute session. After implementation they were able to produce the SSP, policy, device register, DLP alerts, and training records for their CMMC Level 2 assessment.\n\nRisk of not implementing this control\nWithout these controls you face high risk of data exfiltration, malware introduction, loss of CUI, contract penalties or loss of DoD work, regulatory fines, and reputational damage. Removable media is one of the simplest vectors for unauthorized copying — attackers and negligent insiders can bypass network defenses by plugging in an inexpensive USB stick. Failure to provide documented policies, technical enforcement, and audit evidence will result in nonconformities for the Compliance Framework and likely a failed assessment.\n\nSummary: implement a defensible combination of policy, technical enforcement (block/allowlist, encryption, DLP), operational practices (inventory, training, exceptions), and logging to meet AC.L2-3.1.21. Begin by scoping systems that process CUI, update your SSP, deploy targeted OS and MDM/GPO settings, and collect audit evidence — these steps produce both effective risk reduction and the documentation auditors expect."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance to implement USB and removable media controls to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AC.L2-3.1.21) requirements for protecting Controlled Unclassified Information.",
    "permalink": "/how-to-implement-usb-and-removable-media-controls-to-comply-with-nist-sp-800-171-rev2-cmmc-20-level-2-control-acl2-3121-a-step-by-step-guide.json",
    "categories": [],
    "tags": []
  }
}