13.7: Manage USB Devices
CSF v1.1 References:
PF v1.0 References:
Threats Addressed:
The next version of the control set incorporates all or part of this control into: 3.9: Encrypt Data on Removable Media.
Control Statement
If USB storage devices are required, enterprise software should be used that can configure systems to allow the use of specific devices. An inventory of such devices should be maintained.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]