Use of External Systems | Portable Storage Devices — Restricted Use
To meet the “use of external systems | portable storage devices — restricted use” requirement, you must define and enforce rules that limit when authorized staff can connect organization-controlled portable storage (for example, encrypted USB drives) to external, non-organization systems, and you must keep evidence of approvals, restrictions, and periodic revalidation 1.
Key takeaways:
- Define “external systems,” “organization-controlled portable storage,” and your exact restrictions in a policy and SSP-ready procedure 1.
- Enforce the restriction with technical controls (endpoint/MDM/DLP, device control, encryption) plus an exception workflow tied to documented approvals.
- Retain request/approval records, exception justifications, configuration proof, and review outputs so an assessor can test design and operating effectiveness.
AC-20(2) addresses a high-friction, high-risk behavior: people moving data using portable storage, then plugging that storage into devices you do not manage. In FedRAMP and NIST SP 800-53 terms, the risk is not only data loss. It is also loss of control over malware exposure, unauthorized copying, and inability to prove who handled what data under what safeguards.
This requirement is narrow but operationally demanding because it forces you to answer three questions precisely: What counts as an “external system”? Which portable storage devices are “organization-controlled”? What restrictions are strong enough for your environment and data types, and how do you prove they are consistently applied?
For a Compliance Officer, CCO, or GRC lead, the goal is fast operationalization: set clear restrictions, implement enforcement points your auditors can test, and create an evidence trail that survives staff turnover and continuous monitoring. You should expect assessors to look for both (1) technical blocks that prevent uncontrolled use and (2) a controlled exception process with time bounds and periodic review 1. FedRAMP documentation expectations typically map into SSP language and repeatable artifacts 2.
Regulatory text
Requirement (excerpt): “Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems using organization-defined restrictions.” 1
Operator translation: You must (a) define restrictions for when your staff may connect organization-owned portable storage to systems outside your administrative control, (b) implement those restrictions so they are enforceable in practice, and (c) maintain evidence that restrictions, approvals, and exceptions are managed and periodically revalidated 1.
Plain-English interpretation (what this really means)
This control enhancement assumes your organization issues portable storage (commonly encrypted USB media). It then limits whether and how authorized users can connect that media to external systems, such as:
- A personal laptop or home desktop
- A third party’s workstation (supplier, partner, customer site)
- A kiosk or unmanaged shared computer
- Any device outside your endpoint management domain
“Restricted use” does not require a total ban, but it does require explicit, organization-defined boundaries plus a way to prove compliance. For most FedRAMP-scoped environments, teams end up with a default-deny posture and narrow, documented exceptions for specific missions 1.
Who it applies to
In-scope entities
- Cloud Service Providers (CSPs) operating a FedRAMP-authorized cloud service offering and the people administering/supporting it 1.
- Federal agencies and agency personnel/contractors who access or administer systems within the authorization boundary 1.
In-scope operational contexts
Apply this where portable storage could touch:
- Admin workstations used for cloud operations
- Jump boxes and privileged access workstations
- Incident response “go bags” or forensic media
- Data transfer workflows (exports, evidence handling, offline updates) that involve removable media
What you actually need to do (step-by-step)
Step 1: Define the nouns (so you can test them)
Document clear definitions used across policy, SSP, and procedures:
- External system: any endpoint not managed by your organization’s endpoint security stack (MDM/EDR/device control) or not under your administrative control.
- Organization-controlled portable storage: removable media issued, inventoried, and managed by you (asset tag/serial tracking), typically encrypted and configured to your standard.
- Authorized individual: a role with explicit approval to use portable storage (often limited to IT ops, security, IR, or specific mission teams).
Write these definitions in control language suitable for SSP inclusion 2.
Step 2: Choose your “organization-defined restrictions”
Define restrictions that are enforceable and auditable. A practical restriction set usually includes:
- Default rule: organization-controlled portable storage may not be connected to external systems.
- Exception basis: permitted only for defined business purposes (for example, incident response evidence collection, offline patching in controlled environments).
- Data handling bounds: only approved data types may be stored; prohibit regulated/high-impact data unless explicitly authorized by the data owner.
- Security prerequisites: device encryption, strong authentication to unlock, and malware scanning requirements upon re-entry to corporate systems.
- Time bounds: approvals expire; exceptions are reviewed and can be revoked.
Keep the restrictions specific enough that a reviewer can decide “allowed vs not allowed” without interpretation.
Step 3: Implement technical enforcement points
Auditors will not accept “policy-only” for something this easy to violate. Implement at least one hard control that prevents or limits use:
- Device control / endpoint policy: block all removable storage by default, allow only approved device IDs (hardware allowlisting).
- Encryption enforcement: require encrypted removable media issued by IT; block unencrypted media.
- DLP rules: prevent copying certain data classes to removable storage or require justification and logging.
- Logging: capture device insert events, device identifiers, and file operations where feasible.
Map enforcement to the systems in scope (admin endpoints, privileged workstations, support laptops). Document the configuration state and how you validate it.
Step 4: Build an approval + exception workflow you can defend
Create a lightweight but complete request process:
- Requestor submits a ticket describing purpose, destination external system type, data category, and duration.
- Approver (system owner or security) confirms necessity and confirms restrictions.
- IT/SecOps issues/assigns a specific portable device (by serial) and configures allowlisting, if applicable.
- User attestation acknowledges restrictions (no copying beyond scope, no use on other external systems).
- Auto-expiration and revocation steps when the task ends or role changes.
- Post-use checks (malware scan, re-ingest procedure, return and secure storage).
This aligns with the control intent and supports assessor testing for authorization and restriction enforcement 1.
Step 5: Revalidate access and close the loop
Define a recurring review of:
- Who has “authorized individual” status
- Which portable storage devices are active/assigned
- Open exceptions and whether they remain justified
Document revocation triggers (role change, offboarding, policy violation, device loss).
Step 6: Write it into your FedRAMP narrative
In FedRAMP contexts, ensure your SSP/control response includes:
- The restriction statement (what is allowed/prohibited)
- The technical mechanism enforcing it
- The exception process and review cadence
- Evidence references (logs, tickets, reports) 2
Required evidence and artifacts to retain
Keep artifacts in a form a 3PAO or internal audit can sample:
Policy & standards
- Removable media / portable storage standard with explicit “external system” restrictions
- Data classification handling rules for removable media use
Access governance
- Ticketed requests and approvals for portable storage use on external systems
- List of authorized individuals (role-based), with approval authority
- Exception register with scope, expiration, and business justification
Asset management
- Inventory of organization-controlled portable storage devices (serial/asset tag, custodian, encryption status)
- Issue/return records (chain-of-custody where relevant)
Technical proof
- Endpoint/device control configuration screenshots or exported policies
- DLP/device control allowlist showing approved device IDs
- Logs of device connection events, where collected
- Review outputs showing periodic revalidation and revocations
The second-order requirement is “prove it later.” Your evidence set should allow an assessor to trace: person → approval → device → restriction → enforcement → review 1.
Common exam/audit questions and hangups
- “Define external system.” Auditors will push on ambiguous definitions. If “external” includes third-party managed devices, say so explicitly.
- “Show me enforcement.” Expect a request for endpoint policy exports and a live demonstration on a test workstation.
- “How do you prevent personal USB use?” If you only control organization-issued media but do not block all others, explain compensating controls and residual risk.
- “Where is the exception list and who approved it?” Missing approvals is a common failure mode.
- “How do you revalidate?” Examiners will look for evidence that reviews actually happen, not just that they are written down 1.
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails | Better approach |
|---|---|---|
| Policy says “restricted” but doesn’t define restrictions | Un-testable, inconsistent decisions | Publish a clear allow/deny matrix and minimum security prerequisites |
| Relying on training alone | Users can still plug devices into unmanaged endpoints | Enforce via device control and encryption requirements |
| No inventory of portable storage | You cannot prove “organization-controlled” | Track serials, assignment, encryption state, return dates |
| Exceptions granted by email/DM | Weak audit trail; approvals get lost | Use a ticketing workflow with required fields and expiry |
| Reviews performed but not recorded | No evidence of operation | Save review outputs and revocation actions in a central repository |
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific enhancement. In practice, this requirement shows up in FedRAMP assessments as a control design and evidence problem: teams cannot show they constrained portable media use on non-managed endpoints, or they cannot show who is authorized and why 1. The operational risk is straightforward: external systems increase exposure to malware, unauthorized duplication, and loss of forensic traceability.
Practical 30/60/90-day execution plan
First 30 days (stabilize and define)
- Publish definitions and restriction rules (external system, organization-controlled media, authorized individuals) aligned to your boundary 1.
- Stand up a single intake workflow for requests/exceptions (ticket form with mandatory fields).
- Freeze issuance of new portable storage pending inventory and configuration baselines.
Days 31–60 (enforce and evidence)
- Implement device control and removable media policies on in-scope endpoints (admin workstations, privileged access workstations).
- Encrypt and inventory all organization-controlled portable storage; assign custodians.
- Produce your first evidence pack: configuration exports, sample approvals, and an exception register.
Days 61–90 (operate like an auditor is watching)
- Run the first revalidation: authorized individuals list, open exceptions, device inventory reconciliation.
- Test effectiveness: attempt to connect unapproved media on a controlled test endpoint; document results.
- Update SSP/control narratives and attach evidence pointers 2.
Where Daydream fits: Many teams struggle to keep the approval trail, exception register, and periodic reviews consistent across IT, Security, and GRC. Daydream can act as the system of record for third-party and access-related exceptions, centralizing request/approval evidence and recurring review tasks so you can produce assessor-ready artifacts on demand.
Frequently Asked Questions
Does this require banning all USB drives?
No. It requires organization-defined restrictions and enforcement for organization-controlled portable storage used on external systems 1. Many programs default to “deny unless approved,” but the exact rule is yours to define and defend.
What counts as an “external system” in practice?
Treat any endpoint you do not manage and monitor as external, including personal devices and many third-party devices. Write the definition so it matches your endpoint management boundary and is testable during assessment.
If the USB drive is encrypted, is that enough?
Encryption helps but does not address malware exposure or unauthorized copying on unmanaged endpoints. Pair encryption with device control, DLP rules where feasible, and a documented exception process.
How do we handle incident response where responders may need to connect media to third-party machines?
Pre-authorize a narrow IR role, issue dedicated IR media with strict chain-of-custody, and document the specific permitted scenarios and post-use scanning steps. Keep the approvals and runbooks as evidence 1.
What evidence do assessors ask for most often?
Approvals/exception records, device inventories showing “organization-controlled,” and technical configurations that block or restrict removable media. They also ask for proof of periodic revalidation 1.
Can we meet this control if we have some unmanaged endpoints in the environment?
Yes, if the restriction accounts for that reality. The typical pattern is blocking removable storage on unmanaged endpoints by policy (where possible) and prohibiting connection to external systems except via approved exceptions with documented controls.
Footnotes
Frequently Asked Questions
Does this require banning all USB drives?
No. It requires organization-defined restrictions and enforcement for organization-controlled portable storage used on external systems (Source: NIST Special Publication 800-53 Revision 5). Many programs default to “deny unless approved,” but the exact rule is yours to define and defend.
What counts as an “external system” in practice?
Treat any endpoint you do not manage and monitor as external, including personal devices and many third-party devices. Write the definition so it matches your endpoint management boundary and is testable during assessment.
If the USB drive is encrypted, is that enough?
Encryption helps but does not address malware exposure or unauthorized copying on unmanaged endpoints. Pair encryption with device control, DLP rules where feasible, and a documented exception process.
How do we handle incident response where responders may need to connect media to third-party machines?
Pre-authorize a narrow IR role, issue dedicated IR media with strict chain-of-custody, and document the specific permitted scenarios and post-use scanning steps. Keep the approvals and runbooks as evidence (Source: NIST Special Publication 800-53 Revision 5).
What evidence do assessors ask for most often?
Approvals/exception records, device inventories showing “organization-controlled,” and technical configurations that block or restrict removable media. They also ask for proof of periodic revalidation (Source: NIST Special Publication 800-53 Revision 5).
Can we meet this control if we have some unmanaged endpoints in the environment?
Yes, if the restriction accounts for that reality. The typical pattern is blocking removable storage on unmanaged endpoints by policy (where possible) and prohibiting connection to external systems except via approved exceptions with documented controls.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream