13.9: Encrypt Data on USB Storage Devices

If USB storage devices are required, all data stored on such devices must be encrypted while at rest.

Asset Type

Security Function

Implementation Groups

Data

Protect

3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

Inputs

  1. The list of endpoints

Assumptions

  • Asset inventory includes USB storage devices.

Operations

  1. Enumerate all endpoints capable of supporting USB storage devices

  2. For each identified endpoint
    1. Examine the endpoint’s configuration to determine its USB storage device encryption configuration, noting along the way those that are appropriately and inappropriately configured

Measures

  • M1 = List of endpoints capable of supporting USB storage devices

  • M2 = List of endpoints appropriately configured

  • M3 = List of endpoints inappropriately configured

  • M4 = Count of endpoints capable of supporting USB storage devices (count of M1)

  • M5 = Count of endpoints appropriately configured (count of M2)

  • M6 = Count of endpoints inappropriately configured (count of M3)

Metrics

Coverage

Metric

The ratio of appropriately configured endpoints to the total number of endpoints
supporting USB storage devices

Calculation

M5 / M4