4 Steps to Securely Use Removable Storage Media

Ts. Gary Kong
4 min read2 days ago

--

Introduction

Removable storage media offer convenience for data transfer and backup, but they also commonly serve as a means to spread malware or launch power surge attacks, potentially damaging assets and disrupting business operations.

In this article, we will discuss the security controls that organizations can implement to handle removable storage media effectively and minimize the security risks associated with their misuse.

Step 1: Restricting Access to USB Ports

A golden rule in cybersecurity is to deny by default. USB ports can be restricted physically using USB port blockers or logically through configurations in the operating system or endpoint protection software.

USB Port Blockers

To use a USB port blocker, simply attach the blocker to the key and insert it into the USB port. Slide the mechanism on the key to insert or remove the blocker from the USB port.

Mechanism of a USB Port Blocker

Denying Removable Storage Access through Windows Group Policy

If USB usage is not necessary on the computer, open Group Policy Editor and navigate to the path User Configuration\Administrative Templates\System\Removable Storage Access. Enable the state for the following settings:

  • Removable Disks: Deny read access
  • Removable Disks: Deny write access
  • All Removable Storage classes: Deny all access
  • WPD Devices: Deny read access
  • WPD Devices: Deny write access
Removable Storage Access Policies

Remark: To allow removable storage access, simply change the state to disabled.

Step 2: Turning Off Autoplay

When Autoplay is enabled, the system automatically starts reading from a drive when a USB drive is plugged in. This can allow attackers to exploit the feature to launch malicious programs that could damage our computer.

To prevent this, open Group Policy Editor and navigate to the path Computer Configuration\Administrative Templates\Windows Components\AutoPlay Policies. Enable the Turn off Autoplay setting for all drives.

AutoPlay Policies

Step 3: Using Encrypted USB Drives

By using encrypted USB drives, we can ensure that the information stored on the removable drives is inaccessible without knowing the password required to access the drive, protecting data-in-rest.

Hardware-Encrypted USB Drives

Hardware-encrypted USB drives require users to enter a password, either through the built-in application or physically on the hardware (such as the Apricon Aegis Secure Key). The drive can be accessed only when the correct password is entered.

Steps to access storage in Kanguru Defender 3000

Turn on Bitlocker

Although hardware-encrypted USB drives are secure by default, they often have storage limitations, with larger storage capacities typically costing more. Therefore, we may need to use external hard drives, which are not encrypted by default. We can utilize BitLocker to encrypt the hard drive. Note that the setup process may take longer for larger storage capacities.

To enable encryption on the external hard disk, right-click the removable drive, click on “Turn on BitLocker,” and select “Use a password to unlock the drive”.

Turn on BitLocker on the external hard disk

Step 4: Establishing Processes for the Use of Removable Storage Media

Apart from the technological controls mentioned above, organizational controls are equally important for securing the use of removable storage media.

Authorizing the Use of Removable Storage Media

Removable storage media shall be inventoried, reviewed, and approved regularly. Only approved removable storage media may be used upon approval. The use of the media, along with information such as the computer connected to the USB drive and the anti-virus scan result, shall be recorded.

Scan Removable Media on the Virus Scanning Kiosk

Removable storage media shall be scanned for malware on a dedicated virus scanning kiosk with the latest signatures before connecting to the system and documented as evidence.

Scan and record the anti-virus scan results

Monitoring Unauthorized USB Connections to the System

Although the group policy is applied, changes may still occur. To ensure that no unauthorized USB devices are connected, the Windows Command can be run to check the USB devices currently in use:

reg query HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR\

To facilitate monitoring, I’ll run my PowerShell script regularly by configuring Task Scheduler on Windows. The script is accessible at Github.

Code Snippets from the logreview.ps1 PowerShell Script

Conclusion

To securely use removable storage media, we can follow the four steps outlined above: Restricting Access to USB Ports, Turning Off Autoplay, Using Encrypted USB Drives, and Establishing Processes for the Use of Removable Storage Media.

--

--

Ts. Gary Kong

A Cybersecurity Consultant & Trainer based in Malaysia, specializing in providing cybersecurity training grounded in the "think red, act blue" philosophy