Media Access

To meet the FedRAMP Moderate media access requirement, you must define which media types matter in your environment (digital and physical) and restrict access to those media to specific authorized personnel or roles, then prove it with enforceable procedures and access records. This is a “define, restrict, and evidence” control that auditors expect to see operating day to day.

Key takeaways:

  • Define “media” for your system boundary, including cloud snapshots/exports and physical removable media.
  • Enforce role-based restrictions across storage, backup, and physical handling, not just in policy.
  • Keep evidence that access is limited, approved, and reviewed, plus proof of exceptions management.

“Media Access” sounds narrow until you map it to a FedRAMP environment. Media is any digital or non-digital container that can store or move customer data, logs, keys, images, backups, or configurations. In practice, that includes removable drives, paper printouts, and also cloud-native artifacts such as exported database dumps, VM images, container images, snapshots, backup sets, portable logs, and support bundles.

NIST SP 800-53 Rev. 5 MP-2 requires a straightforward outcome: only defined roles may access defined types of media, and you must actively restrict that access (not just state intent). The operational challenge is scoping and consistency. Most control failures come from “shadow media” (engineering exports, ad-hoc downloads, support tooling, or unmanaged removable devices) that bypass normal access control patterns.

This page focuses on fast operationalization: how to define media types, map them to roles, implement technical and physical restrictions, and retain evidence that survives FedRAMP assessment scrutiny. It is written for a CCO, compliance officer, or GRC lead who needs implementable steps and auditor-ready artifacts.

Regulatory text

Requirement (MP-2): “Restrict access to organization-defined types of digital and non-digital media to organization-defined personnel or roles.” 1

Plain-English interpretation

You must (1) explicitly list the media types in scope for your system, (2) explicitly list which roles can access each media type, and (3) implement real restrictions so only those roles have access. Then you must keep evidence that restrictions are in place and operating.

This is not limited to physical removable drives. In FedRAMP cloud systems, “media” often includes:

  • Backups and backup repositories
  • Snapshots and images (VM images, AMIs, golden images)
  • Exported data sets (database dumps, CSV exports, diagnostic bundles)
  • Log archives and object storage buckets used for retention
  • Build artifacts and container registries if they contain sensitive data

Who it applies to

Applies to:

  • Cloud Service Providers operating a FedRAMP Moderate authorized system
  • Federal Agencies operating or inheriting controls for a FedRAMP Moderate system

Operational contexts where MP-2 shows up in audits:

  • Backup/restore operations and admin access to backup consoles
  • Engineering and SRE access to snapshots, image registries, or infrastructure templates
  • Security and incident response access to forensic copies and log archives
  • Customer support access to exported diagnostic bundles
  • Physical handling of removable media, printed records, or any media used in continuity scenarios

What you actually need to do (step-by-step)

1) Define “media types” for your system boundary

Create a Media Typology that is specific enough to enforce. Start with a table like this:

Media type (examples) Digital / Non-digital Typical location/tooling Data sensitivity Allowed roles
Backup sets Digital Backup platform / vault High Backup Admin, Security
Snapshots/images Digital Cloud snapshots/image service High Cloud Ops, Security
Data exports Digital Approved export workflow, secure bucket High Data Custodian, Support (limited)
Logs/forensic packages Digital SIEM, archive bucket Medium/High Security Ops
Removable drives Non-digital Secure cabinet High Security, IT Ops (break-glass)
Printed output Non-digital Secure printer + locked bins Medium/High Named business roles

Your goal is to eliminate ambiguity. If teams argue about whether “support bundles” count as media, you want your definition to settle the question.

2) Define authorized roles, not just named individuals

Auditors want to see role-based authorization with controlled assignment. Build a Media Access Matrix that maps each media type to:

  • Owner (accountable role)
  • Authorized roles
  • Access method (console, API, physical checkout)
  • Approval required? (yes/no; by which role)
  • Monitoring and review expectations

Keep “named individuals” in access lists (where required) but anchor your control in roles so it survives turnover.

3) Implement technical restrictions for digital media

Your restrictions should be enforceable through IAM and system configuration, not dependent on “people doing the right thing.”

Common implementation patterns:

  • Separate storage locations for sensitive media (e.g., dedicated backup vault or bucket) with explicit deny-by-default policies.
  • Role-based access controls for backup consoles, snapshot APIs, export workflows, and object storage.
  • Controlled export paths: if data exports are allowed, require exports to land only in approved secure repositories, not local laptops.
  • Break-glass access for emergency restore or forensic access, with explicit approval and logging.

Minimum expectation: you can demonstrate that an unauthorized engineer cannot list, read, copy, or delete backups/snapshots/exports.

4) Implement physical restrictions for non-digital media

For any physical media in scope:

  • Store in secured locations (locked cabinets/rooms) with controlled keys/badges.
  • Use a checkout process that records who accessed what, when, and why.
  • Define rules for transport and destruction if media ever leaves the primary site.

Even if your organization “doesn’t use removable media,” document the stance and enforce it (for example, a standard that prohibits removable storage in production environments plus endpoint controls to block it, if applicable).

5) Put procedures around the access control, not just policy

Write a short, operational Media Handling Procedure that covers:

  • How access is requested and approved (by role)
  • How access is provisioned (which systems, which groups)
  • How access is revoked (termination and role change triggers)
  • How exceptions are granted (time-bound, documented, reviewed)
  • How you review access (what evidence you produce)

Procedures are where audit outcomes are decided. Policy states intent; procedure proves repeatability.

6) Monitor, review, and remediate

You need an operating cadence that shows the control works over time:

  • Review membership in “media access” roles/groups.
  • Review access logs for high-risk media (backups, snapshots, exports).
  • Investigate anomalies (unexpected export activity, access from unusual contexts).
  • Track exceptions to closure.

If you use Daydream to run your control operations, keep the Media Access Matrix, role attestations, exceptions, and evidence collection in a single control record so audits become retrieval work, not archaeology.

Required evidence and artifacts to retain

Auditors commonly ask for proof across three layers: definition, enforcement, and operation.

Definition artifacts

  • Media Typology (in-scope media types list)
  • Media Access Matrix (media type → authorized roles)
  • Media Handling Procedure (request/approve/provision/revoke/exception)

Enforcement artifacts (technical)

  • IAM role/group definitions and membership exports for media-relevant roles
  • Access control policies for storage locations (backup vaults, buckets, registries)
  • Screenshots or configuration exports showing deny-by-default and scoped permissions
  • Evidence of break-glass controls (role design, approval workflow, logging)

Enforcement artifacts (physical)

  • Physical access lists for secured storage areas (if applicable)
  • Media checkout logs (paper or ticketed workflow)
  • Secure storage photos are sometimes helpful, but rely on logs and procedures

Operating evidence

  • Periodic access review records (attestations, review tickets, sign-offs)
  • Exception register (who, what media, duration, approver, closure)
  • Sample access logs showing only authorized roles accessed restricted media

Common exam/audit questions and hangups

Expect these in FedRAMP-style testing:

  1. “What media types did you define, and why?”
    Have your typology ready, tied to your system boundary.

  2. “Show me who can access backups and snapshots.”
    Be prepared to show role membership and the system config that enforces access.

  3. “How do you prevent engineers from exporting production data?”
    If exports are allowed, show a controlled workflow. If prohibited, show preventive controls and detective monitoring.

  4. “How do you handle emergency restores?”
    Show break-glass access, approvals, and logs.

  5. “Do you use removable media?”
    If “no,” show how you enforce the prohibition and what you do if an exception occurs.

Frequent implementation mistakes and how to avoid them

  • Mistake: Defining media too narrowly (only USB drives).
    Fix: Treat cloud-native artifacts as media: backups, snapshots, images, and exports.

  • Mistake: Policy-only control with no technical enforcement.
    Fix: Implement IAM restrictions and storage policies that prevent access by default.

  • Mistake: Over-broad admin roles (“all engineers are admins”).
    Fix: Split duties. Create dedicated roles for backup admin, snapshot admin, export approver, and forensic access.

  • Mistake: No evidence of ongoing operation.
    Fix: Keep access reviews, exception logs, and samples of access logs ready for the assessment window.

  • Mistake: Exceptions that never expire.
    Fix: Require time-bounded exceptions with documented justification and closure.

Enforcement context and risk implications

No public enforcement cases were provided in the available sources for this requirement, so focus on the operational risk: unrestricted media access is a direct path to data exfiltration, irreversible deletion of backups, and uncontrolled propagation of sensitive data into places your security controls do not cover (laptops, unmanaged storage, or ad-hoc shares). In FedRAMP environments, assessors will treat weak backup/snapshot/export access controls as high-impact because they often contain complete replicas of production data.

Practical 30/60/90-day execution plan

First 30 days (Immediate stabilization)

  • Confirm system boundary and list all repositories that store “media” (backups, snapshots, exports, logs, images).
  • Draft Media Typology and Media Access Matrix.
  • Identify current role groups with access to each repository and flag “everyone/admin” patterns.
  • Implement quick wins: remove broad access to backup and snapshot locations where feasible; require approvals for export workflows.

Next 60 days (Control implementation)

  • Finalize and publish the Media Handling Procedure.
  • Implement IAM role redesign for media access (least privilege, separate duties).
  • Stand up break-glass access for emergency restore/forensics with logging and approvals.
  • Create the evidence pack structure (folders/tickets/control record) and start collecting config exports and role membership snapshots.

By 90 days (Operate and prove)

  • Run at least one access review cycle for media access roles and document remediation.
  • Test backup restore access path using the restricted roles and capture proof.
  • Validate monitoring for media access events (backup reads, snapshot copies, export jobs) and document alert handling.
  • Prepare assessor-ready samples: one authorized access event, one denied access test, one closed exception.

Frequently Asked Questions

Does “media” include cloud snapshots and backups, or only physical devices?

MP-2 covers both digital and non-digital media, so cloud snapshots, images, backups, and exports are in scope if they store your system’s data. Define them explicitly in your Media Typology and restrict access by role. 1

We prohibit removable media. How do we satisfy MP-2?

Document removable media as a defined media type with “prohibited” handling and restrict access accordingly (for example, only Security can approve exceptions). Keep evidence of enforcement, such as endpoint controls or exception records, plus your procedure.

Do we need a separate access review just for media access roles?

You need evidence that access to defined media types is restricted to defined roles and that the restriction remains true over time. Many teams satisfy this by scoping media-access groups into their standard privileged access review and retaining the review outputs.

How granular should the “organization-defined types of media” list be?

Granular enough that you can enforce it technically and explain it in an audit. “All cloud storage” is too broad for clean testing; “backup vaults, snapshot service, export buckets, log archive buckets, removable media” is usually auditable.

What’s the cleanest way to handle emergency restore access?

Use a break-glass role that is disabled by default, requires documented approval for activation, and produces logs showing who activated it and what media they accessed. Keep those approvals and logs as your operating evidence.

How does this affect third parties like managed service providers or support contractors?

If a third party can access your defined media types, they must be placed into controlled roles with the same restrictions, approvals, and monitoring. Treat third-party access as role assignment with time bounds and documented business need.

Footnotes

  1. NIST Special Publication 800-53 Revision 5

Frequently Asked Questions

Does “media” include cloud snapshots and backups, or only physical devices?

MP-2 covers both digital and non-digital media, so cloud snapshots, images, backups, and exports are in scope if they store your system’s data. Define them explicitly in your Media Typology and restrict access by role. (Source: NIST Special Publication 800-53 Revision 5)

We prohibit removable media. How do we satisfy MP-2?

Document removable media as a defined media type with “prohibited” handling and restrict access accordingly (for example, only Security can approve exceptions). Keep evidence of enforcement, such as endpoint controls or exception records, plus your procedure.

Do we need a separate access review just for media access roles?

You need evidence that access to defined media types is restricted to defined roles and that the restriction remains true over time. Many teams satisfy this by scoping media-access groups into their standard privileged access review and retaining the review outputs.

How granular should the “organization-defined types of media” list be?

Granular enough that you can enforce it technically and explain it in an audit. “All cloud storage” is too broad for clean testing; “backup vaults, snapshot service, export buckets, log archive buckets, removable media” is usually auditable.

What’s the cleanest way to handle emergency restore access?

Use a break-glass role that is disabled by default, requires documented approval for activation, and produces logs showing who activated it and what media they accessed. Keep those approvals and logs as your operating evidence.

How does this affect third parties like managed service providers or support contractors?

If a third party can access your defined media types, they must be placed into controlled roles with the same restrictions, approvals, and monitoring. Treat third-party access as role assignment with time bounds and documented business need.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
FedRAMP Moderate Media Access: Implementation Guide | Daydream