Safeguard 10.3: Disable Autorun and Autoplay for Removable Media
To meet the safeguard 10.3: disable autorun and autoplay for removable media requirement, you must centrally disable Autorun/Autoplay on managed endpoints (and any managed servers where removable media is allowed), verify the setting is enforced, and retain proof of ongoing compliance. Operationalize it with standard configuration baselines, exception handling, and recurring evidence capture. 1
Key takeaways:
- Disable Autorun and Autoplay through centrally managed configuration, not user settings. 1
- Scope includes removable media use cases across Windows, macOS, and Linux endpoints where feasible, plus virtual desktop fleets. 2
- Auditors will ask for proof of enforcement and monitoring, not a policy statement. 1
Safeguard 10.3 exists to remove a common infection path: removable media that executes code automatically when inserted. Even if your organization already restricts USB storage, you still need this control because “removable media” includes more than thumb drives in real environments (external hard drives, SD cards, and sometimes mounted media presented through docking stations or specialized devices). The operational goal is simple: insertion of removable media must not trigger automatic execution or auto-launch behaviors on managed systems. 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to defensible compliance is to treat this as a baseline configuration control with measurable technical enforcement. That means: define scope, set the standard, deploy via your endpoint management stack, validate with independent checks, and preserve evidence on a recurring cadence. If you allow exceptions (kiosks, lab instruments, OT jump hosts, developer test rigs), you need an exception record and compensating controls that reduce the same risk. 1
This page gives requirement-level implementation guidance you can hand to endpoint engineering and audit teams and get to a testable outcome quickly.
Regulatory text
Framework requirement: “CIS Controls v8 safeguard 10.3 implementation expectation (Disable Autorun and Autoplay for Removable Media).” 1
Operator interpretation: You are expected to prevent managed systems from automatically running or launching content when removable media is inserted. Disabling Autorun/Autoplay must be enforced through managed configuration and treated as an auditable control with repeatable evidence capture. 1
What an assessor will look for: a documented control statement, technical configuration settings applied across in-scope assets, validation results, and an exception process for outliers. 2
Plain-English interpretation (what this really means)
- Users can still insert removable media (if allowed by your organization), but the system must not automatically execute code or automatically start playback/open an app based on the media’s metadata. 1
- You are reducing “zero-click” execution paths from removable media and decreasing the chance that a user’s normal workflow triggers malware execution. 1
- The compliance standard is not “we told users not to.” It is “we configured systems so they can’t.” 1
Who it applies to
Entity scope: Most enterprises and technology organizations that manage endpoints and user workstations, regardless of industry, can map this safeguard directly into endpoint configuration management. 2
Operational scope (systems and contexts):
- End-user endpoints: corporate laptops/desktops, shared workstations, call center desktops, VDI images. 1
- Servers (conditional): include servers if users can attach removable media to them (rare but common in IT admin jump hosts and break-glass systems). 1
- Special-purpose devices: kiosks, lab systems, media ingestion machines, conference room PCs—often where Autoplay is mistakenly left enabled. 1
- Third party-managed endpoints: if a third party supports systems in your environment, you still need a clear responsibility assignment and evidence that the configuration is enforced (contract clauses, attestation, or technical reporting). 1
What you actually need to do (step-by-step)
1) Define the control statement and scope boundary
Create a short control description in your control library:
- Control objective: Disable Autorun/Autoplay for removable media on all in-scope managed systems. 1
- In-scope assets: all managed endpoints; include VDI gold images; include admin jump hosts; identify any allowed exception classes (OT, lab, kiosk). 1
- Owner: Endpoint Engineering (technical), GRC/Compliance (oversight), IT Operations (exception approvals). 1
2) Pick your technical enforcement mechanism per platform
You want centralized, tamper-resistant enforcement:
- Windows: enforce via Group Policy (GPO) or MDM configuration profiles. Confirm the setting covers both Autorun and Autoplay behaviors for removable media. 1
- macOS: enforce via MDM profiles and configuration restrictions relevant to external media behaviors; document how your tooling prevents user override. 1
- Linux: disable desktop environment autoplay/auto-mount behaviors where applicable; document your endpoint standard for workstation images. 1
Practical tip: write the “how” as an engineering runbook and the “what” as the compliance requirement. Auditors need the “what,” but operators succeed with the “how.”
3) Implement via baseline configuration and change control
- Add the setting to your secure configuration baseline (the same place you manage screen lock, firewall, and macro settings). 1
- Deploy to a pilot group representing common device types (laptops, desktops, VDI pool) and one “problem child” population (developers, field devices) to flush out conflicts.
- Roll out broadly through your endpoint management tool using staged deployment if your environment requires it; document the rollout decision and approval in change management records. 1
4) Validate enforcement with independent checks
Do not rely on “policy applied” as your only validation. Combine:
- Configuration compliance reporting from GPO/MDM (device-level status).
- Spot checks on representative devices (screenshots or command output that shows Autoplay/Autorun is disabled).
- Drift detection (your endpoint configuration monitoring should flag devices where the setting is missing or reverted). 1
5) Implement exceptions with compensating controls
Some environments claim they “need Autoplay” for a workflow. Treat this as a high-friction exception:
- Require a written business justification and time limit.
- Require compensating controls such as: removable media restrictions, application allowlisting on the device, malware scanning on insertion, and restricted local admin rights. 1
- Keep an exception register entry that maps the exception to the safeguard, states the compensating controls, and shows approval. 1
6) Operationalize recurring evidence capture
Your goal is “always-on proof”:
- Schedule recurring exports/reports from MDM/GPO compliance views.
- Keep a simple monthly or quarterly control operation record that states: population size in scope, number compliant, list of non-compliant devices with remediation tickets. Avoid percentages unless your tools produce them and you can retain the source report. 1
If you use Daydream to manage your control library and evidence, map Safeguard 10.3 to a documented control operation and set an evidence request cadence so your team does not rebuild audit packets under pressure. 1
Required evidence and artifacts to retain
Store evidence in a way an auditor can replay the story:
Policy / standards
- Endpoint configuration standard that states Autorun/Autoplay is disabled for removable media. 1
- Control narrative mapped to CIS v8 Safeguard 10.3 with scope statement. 2
Technical configuration
- GPO/MDM profile screenshots or exported configuration settings showing the relevant Autorun/Autoplay disablement. 1
- Deployment groups / assignment rules showing which device groups receive the policy. 1
Operational proof
- Compliance report exports (device compliance status for the setting).
- Sample device validation artifacts (screenshots/command outputs) with hostname, timestamp, and operator initials. 1
- Remediation tickets for exceptions or drift, with closure evidence. 1
Exceptions
- Exception register entries, approvals, compensating controls, and review notes. 1
Common exam/audit questions and hangups
- “Show me it’s enforced, not documented.” Have the GPO/MDM profile plus device compliance reporting ready. 1
- “What systems are in scope?” Auditors dislike hand-wavy scopes. Provide an asset inventory extract or endpoint count by platform, then show the policy targeting logic. 1
- “How do you know it stays disabled?” Show recurring evidence capture and drift remediation workflow. 1
- “What about third party-supported endpoints?” Provide contractual responsibility language or a technical report produced by the third party’s management plane, plus your review/acceptance record. 1
Frequent implementation mistakes (and how to avoid them)
- Mistake: relying on user training. Fix: enforce via GPO/MDM; treat training as supplemental. 1
- Mistake: disabling Autoplay but not Autorun behaviors. Fix: explicitly verify both are addressed by your platform configuration and validate on an endpoint. 1
- Mistake: excluding VDI images. Fix: bake the setting into the golden image and also enforce via the VDI management policy layer. 1
- Mistake: exceptions without compensating controls. Fix: formal exception workflow tied to risk acceptance, with concrete compensating controls and review cadence. 1
- Mistake: no evidence trail. Fix: pre-schedule evidence exports and store them with clear naming (date, fleet, control). Daydream-style evidence tasks help keep this from becoming a calendar reminder that nobody owns. 1
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this safeguard. In practice, the risk is operational and incident-driven: Autorun/Autoplay increases the chance that removable media introduces malware without deliberate user action, which can trigger broader compromise and regulatory exposure through downstream incident reporting obligations. Keep the discussion grounded: this safeguard reduces a known execution pathway and is straightforward to test. 1
Practical 30/60/90-day execution plan
Use phases to match your change management reality.
First 30 days (baseline + pilot)
- Confirm in-scope asset populations (Windows/macOS/Linux/VDI) and identify device owners.
- Draft the control narrative and endpoint standard update mapped to Safeguard 10.3. 1
- Build GPO/MDM profiles; run a pilot; document test results and any workflow breakage.
Days 31–60 (rollout + monitoring)
- Deploy to the broader fleet through normal change control.
- Turn on compliance reporting for the setting; create a remediation queue for non-compliant endpoints. 1
- Stand up the exception workflow with required compensating controls and approval routing.
Days 61–90 (evidence hardening + audit readiness)
- Formalize recurring evidence capture (report exports + sampling). 1
- Add control operation steps to your GRC calendar and assign ownership.
- Run an internal “mock audit”: produce the artifacts list above from scratch and fix gaps.
Frequently Asked Questions
Does disabling Autoplay also disable Autorun on Windows?
Not always. Validate both behaviors with your specific GPO/MDM settings and a device-level check, and retain proof that the applied configuration addresses the safeguard requirement. 1
What counts as “removable media” for this safeguard?
Treat it broadly: USB mass storage, external drives, and similar removable storage presented to the OS. Document your definition in the control narrative so scope questions do not stall your assessment. 1
We block USB storage. Do we still need Safeguard 10.3?
Usually yes, because exceptions happen and some removable media classes may still be permitted. Disabling Autorun/Autoplay is a low-friction safety layer and is easy to validate. 1
How do we handle kiosks or lab devices that ingest media as part of operations?
Use an exception with compensating controls (restricted apps, scanning on insertion, tight privilege controls) and document the business justification and approval. Keep the exception list current and review it routinely. 1
What evidence is “enough” for an auditor?
Provide (1) the enforced configuration artifact (GPO/MDM profile), (2) a fleet compliance report export, and (3) a small set of device-level validation samples, plus any exceptions with approvals. 1
How can Daydream help without turning this into a big GRC project?
Map Safeguard 10.3 to a control record, attach the endpoint standard and the MDM/GPO artifacts, and schedule recurring evidence capture tasks so the same proof shows up every cycle without manual chasing. 1
Footnotes
Frequently Asked Questions
Does disabling Autoplay also disable Autorun on Windows?
Not always. Validate both behaviors with your specific GPO/MDM settings and a device-level check, and retain proof that the applied configuration addresses the safeguard requirement. (Source: CIS Controls v8)
What counts as “removable media” for this safeguard?
Treat it broadly: USB mass storage, external drives, and similar removable storage presented to the OS. Document your definition in the control narrative so scope questions do not stall your assessment. (Source: CIS Controls v8)
We block USB storage. Do we still need Safeguard 10.3?
Usually yes, because exceptions happen and some removable media classes may still be permitted. Disabling Autorun/Autoplay is a low-friction safety layer and is easy to validate. (Source: CIS Controls v8)
How do we handle kiosks or lab devices that ingest media as part of operations?
Use an exception with compensating controls (restricted apps, scanning on insertion, tight privilege controls) and document the business justification and approval. Keep the exception list current and review it routinely. (Source: CIS Controls v8)
What evidence is “enough” for an auditor?
Provide (1) the enforced configuration artifact (GPO/MDM profile), (2) a fleet compliance report export, and (3) a small set of device-level validation samples, plus any exceptions with approvals. (Source: CIS Controls v8)
How can Daydream help without turning this into a big GRC project?
Map Safeguard 10.3 to a control record, attach the endpoint standard and the MDM/GPO artifacts, and schedule recurring evidence capture tasks so the same proof shows up every cycle without manual chasing. (Source: CIS Controls v8)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream