🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.8

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.8

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.8 – Prohibit the use of portable storage devices when such devices have no identifiable owner.

Understanding the Requirement

This control requires that portable storage devices (USB thumb drives, external hard drives, SD cards, etc.) not be used on company systems unless they have a clearly identifiable, authorized owner. The objective is to eliminate untracked, potentially malicious media from entering and moving within your environment. For organizations aligning to NIST SP 800-171 REV.2 / CMMC 2.0 Level 2, the emphasis is on both policy and technical enforcement so only company-issued and inventoried devices are usable on corporate endpoints.

Technical Implementation

  • Inventory and labeling: Maintain a central inventory (spreadsheet or asset system) that records make, model, serial number, and assigned owner for every company-issued portable storage device. Physically label devices with an asset tag and owner name or ID to make ownership obvious.

  • Policy and training: Publish a clear removable media policy that prohibits use of any portable storage device that is not company-issued and recorded in the inventory. Train employees to never connect found or personal devices, and to report discovered media to IT or security immediately.

  • Endpoint controls / whitelisting: Deploy endpoint security (EDR/AV or specialized device-control software) that enforces a whitelist of allowed USB device IDs or serial numbers. Configure the control to block mass-storage-class devices that are not on the approved list.

  • Operating-system restrictions: Use Group Policy (Windows) or MDM (macOS, Linux endpoints where supported) to restrict USB mass storage driver installation and to allow only those devices that match permitted hardware identifiers. Combine driver-blocking with a user prompt and admin approval flow for exceptions.

  • Encryption and secure provisioning: Issue only encrypted, company-provisioned devices (hardware-encrypted drives or drives provisioned with company keys). Record the provisioning steps and link the device's cryptographic identity to the inventory entry and owner.

  • Monitoring and incident handling: Log all removable-media attach/detach events and alert on attempts to use an unregistered device. Define an incident workflow for discovered or blocked devices (quarantine, malware scan, owner verification, and disposal if necessary).

Example in a Small or Medium Business

Acme Tech, a 60-person engineering firm, maintains a simple asset registry in a shared database where each issued USB drive and external SSD is recorded with serial number, provisioning date, and the employee to whom it was issued. IT physically labels devices with an asset tag and records the label in the database at handoff. The company policy forbids plugging in any non-company device; staff receive short annual training and a one-page quick reference describing the rule and the reporting process. On Windows workstations, Group Policy blocks unapproved USB storage drivers and an endpoint agent enforces a whitelist of device serial numbers. One day an engineer finds a thumb drive in the parking lot and attempts to use it; the endpoint agent blocks access, logs the event, and notifies the security mailbox. IT follows the response playbook: the device is quarantined, scanned in an isolated VM, and then securely destroyed because the owner could not be identified. Quarterly audits cross-check physical tags against the registry, and missing or returned devices are tracked until ownership is updated or the device is officially retired.

Summary

Combining a clear policy that forbids unknown portable media with an up-to-date inventory, physical tagging, and technical enforcement (whitelisting, OS restrictions, and monitoring) lets SMBs meet MP.L2-3.8.8. Policy defines expectations and reporting paths; technical controls prevent unauthorized devices from functioning and create forensic logs when blocks occur. Regular audits, training, and an incident workflow close the loop so only company-owned, identifiable storage devices are used on your systems, reducing the risk of malware introduction and data loss.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes