S 4.200 Handling of USB storage media

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

A number of utility devices can be connected to a PC using the USB interface. Examples of such devices include hard disks, CD/DVD burners, and memory sticks. USB memory sticks consist of a USB connector and a memory chip. Despite their large storage capacity, they are so small that they are manufactured in the form of key rings, for example, and can fit in any trouser pocket. Their price has fallen so sharply that USB sticks also render diskettes obsolete in private use. The drivers for USB mass storage devices are already integrated in modern operating systems, therefore it is no longer necessary to install any additional software to use them. In general, this safeguard not only applies to USB storage media, but also to all other types of USB devices that can store data. USB printers and USB cameras, among other devices, can also be "misused" to store data. This applies in particular to "intelligent" USB devices such as PDAs, which can assume any USB identity if they are equipped with special software.

As in the case of diskettes, USB storage media allow information and programs to be read in or out in an uncontrolled manner. For this reason, USB storage media generally should be handled just like conventional storage media. It is relatively easy to prevent access to disk drives (see S 4.4 Correct handling of drives for removable media and external data storage). In contrast, it is very difficult to prevent the operation of USB storage media if the USB interface is used for other devices. For example, with some notebooks the mouse can only be connected to a USB interface. This makes it generally impractical to use a USB lock or to disable the interface using some other mechanical safeguard. The use of interfaces should therefore be controlled by granting the appropriate permissions at the operating system level or with additional utility programs. Alternatively, it is possible to monitor the adding of devices. When data storage devices are connected to external interfaces, drivers or kernel modules are often loaded by the operating system or entries are created in configuration files (e.g. in the Windows registry) that can be detected. When the changes are then detected, a log file can be created or an administrator can be notified, for example. However, this can only be accomplished using additional software, which must be developed in-house or purchased from a third-party vendor.

The technical details for Windows 2000 and XP are described in the following.

Disabling device drivers

Monitoring the computer

Review questions: