🏛️NIST 800-53 MP-7Rule: NIST-MP-007medium

Media Use Restrictions

Description

Restrict or prohibit the use of removable digital media (USB drives, external SSDs, CDs) on organizational systems.

⚠️ Risk Impact

Removable media is a dominant exfiltration vector and malware delivery mechanism. USB devices specifically enable BadUSB attacks (hardware-implant keyloggers, network injectors, data exfiltrators).

🔍 How EchelonGraph Detects This

NIST-MP-007Automated scanner rule

EchelonGraph's Tier 1 Cloud Scanner automatically checks for this condition across all connected cloud accounts. Violations are flagged as medium-severity findings with remediation guidance.

🔧 Remediation

Configure endpoint security to block USB mass-storage by default. Allow specific approved devices via allow-list. Log all USB connections for review. For high-security environments: physical USB port blockers + audit cameras.

💀 Real-World Attack Scenario

Stuxnet (2010): infected USB drives delivered the malware to air-gapped Iranian nuclear facilities. The attack design specifically exploited removable-media policies. Modern variant: a Mr Robot fan posted USB drives in a corporate parking lot in 2017 (security awareness exercise) — 48% were plugged in. BadUSB devices in 2024 cost $30 on AliExpress.

💰 Cost of Non-Compliance

USB-delivered malware: 23% of FedRAMP audits cite MP-7 deficiencies (CISA 2024). Average cost of USB-introduced breach: $4.55M (IBM 2024).

📋 Audit Questions

  • 1.Are USB mass-storage devices blocked by default?
  • 2.How are approved USB devices managed (allow-list)?
  • 3.Show last 30 days of USB-connection events.
  • 4.What is the policy for visitor-brought USB devices?

🎯 MITRE ATT&CK Mapping

T1091 — Replication Through Removable MediaT1052 — Exfiltration Over Physical Medium

⚡ Common Pitfalls

  • USB policy documented but not technically enforced — relying on staff compliance
  • Allow-list of approved devices that grows without review
  • No logging of USB connections — exfiltration goes undetected

📈 Business Value

USB restrictions close an attack vector that's invisible to network-based controls. Effective + low effort.

⏱️ Effort Estimate

Manual

8-16 hours endpoint policy configuration + audit

With EchelonGraph

EchelonGraph integrates with MDM/EDR to monitor USB events

🔗 Cross-Framework References

SOC2-CC6.4ISO27001-A.7.10

Automate NIST 800-53 MP-7 compliance

EchelonGraph continuously monitors this control across all your cloud accounts.

Start Free →