Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-22112 | STO-DRV-030 | SV-25617r2_rule | Medium |
Description |
---|
Removable media often arrives from the vendor with many files already stored on the drive. These files may contain malware or spyware which present a risk to DoD resources. |
STIG | Date |
---|---|
Removable Storage and External Connections Security Technical Implementation Guide | 2017-03-02 |
Check Text ( C-27097r2_chk ) |
---|
Interview the site representative to determine if organization-approved tools are being used for scanning and wiping all external storage drives and removable media prior to first time use. If organization approved scanning and wiping tools are not used prior to first time use of removable flash media or external hard disk drives, this is a finding. |
Fix Text (F-23199r2_fix) |
---|
For all removable flash media and external hard disk drives, use an organization-approved method to wipe the device before using for the first-time. |