1.1.1.10 Ensure usb-storage kernel module is not available

Information

USB storage provides a means to transfer and store files ensuring persistence and availability of the files independent of network connection status. Its popularity and utility has led to USB-based malware being a simple and common means for network infiltration and a first step to establishing a persistent threat within a networked environment.

Restricting USB access on the system will decrease the physical attack surface for a device and diminish the possible vectors to introduce malware.

Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163

Solution

Unload and disable the usb-storage kernel module.

- Run the following commands to unload the usb-storage kernel module:

# modprobe -r usb-storage 2>/dev/null
# rmmod usb-storage 2>/dev/null <xhtml:ol start="2"> - Perform the following to disable the usb-storage kernel module:

Create a file ending inconf with install usb_storage /bin/false in the /etc/modprobe.d/ directory

Example:

# printf '%s\n' "" "install usb_storage /bin/false" >> /etc/modprobe.d/60-usb-storage.conf

Create a file ending inconf with blacklist usb_storage in the /etc/modprobe.d/ directory

Example:

# printf '%s\n' "" "blacklist usb_storage" >> /etc/modprobe.d/60-usb-storage.conf

Impact:

Disabling the usb-storage module will disable any usage of USB storage devices.

If requirements and local site policy allow the use of such devices, other solutions should be configured accordingly instead. One example of a commonly used solution is USBGuard

See Also

https://workbench.cisecurity.org/benchmarks/24008

Item Details

Category: MEDIA PROTECTION

References: 800-53|MP-7, CSCv7|13.7

Plugin: Unix

Control ID: 7257a0d88ed331312cf779ac0b189d41508741d3c7a3ff820c1cfa23d59ec959