AC-20(2): Portable Storage Devices — Restricted Use
AC-20(2): portable storage devices — restricted use requirement means you must tightly control whether, when, and how organization-owned portable storage (for example, USB drives) can be connected to external systems (non-organization systems). Operationalize it by defining approved external-use scenarios, enforcing them with technical controls (device control, encryption, logging), and keeping auditable evidence of authorizations and exceptions. 1
Key takeaways:
- Define what “external systems” and “portable storage devices” mean in your environment, then restrict use via policy plus technical enforcement. 1
- Maintain an authorization model: who can use organization-controlled devices externally, for what purpose, and under what conditions. 1
- Evidence matters as much as configuration: approvals, device inventory, enforcement settings, and logs are what assessors ask for first. 1
AC-20(2): portable storage devices — restricted use requirement is a control enhancement under NIST SP 800-53 that targets a common, hard-to-see data loss path: an employee connects an organization-owned USB drive to an external system and data leaves your managed boundary. “External” can mean a personally owned computer, a third-party kiosk, a supplier’s workstation, a partner lab environment, or any non-organization endpoint where your standard protections (EDR, DLP, patching, monitoring) may not exist or may be outside your authority.
The practical challenge is that many organizations already have baseline controls for portable media (encryption, malware scanning, labeling), but AC-20(2) adds a specific governance constraint: organization-controlled portable storage devices can only be used on external systems under defined restrictions. That implies three things you must nail down quickly: (1) what the allowed use cases are, (2) how you enforce them technically, and (3) how you prove to an assessor that enforcement and authorization really happen.
If you need to operationalize fast, treat this as an access control problem plus an asset control problem: approved people, approved devices, approved external contexts, and auditable approvals. 2
Regulatory text
Control requirement (excerpt): “Restrict the use of organization-controlled portable storage devices by authorized individuals on external systems using {{ insert: param, ac-20.02_odp }}.” 1
What the operator must do:
- Restrict use: Default to “not allowed” unless explicitly permitted by your organization-defined restrictions (the parameter in the control is where you specify the restriction mechanism/conditions). 1
- Scope to organization-controlled devices: The devices in question are owned/managed by you (inventoryable, configured, and issuable), not random consumer media. 1
- Limit to authorized individuals: Only named roles/users with explicit approval can perform the external use. 1
- Focus on external systems: The prohibited or restricted event is connection/use on systems outside your control boundary. 1
Plain-English interpretation
You are allowing a high-risk action only when you can defend it. The action is: “Organization-issued portable storage touches a non-organization machine.” Your restriction can be strict (ban all external use) or conditional (allow only for specific functions such as incident response or regulated lab transfer), but it must be defined, enforced, and evidenced. 1
Who it applies to
Entities: Federal information systems and contractor systems handling federal data commonly inherit or adopt NIST SP 800-53 control baselines and enhancements, including AC-20(2). 2
Operational contexts where assessors expect this control to be real:
- Field work where staff connect media to customer/partner equipment.
- Manufacturing, OT, or lab environments with air-gapped transfers.
- Incident response and forensics where data moves between enclaves.
- Third-party support scenarios where data must be exported/imported.
Systems and teams:
- Endpoint engineering (device control/MDM/EDR)
- IT asset management (inventory, issuance, returns)
- Security operations (logging, alerts, exception review)
- GRC/compliance (policy, approvals, evidence, assessment readiness)
What you actually need to do (step-by-step)
1) Define “external system” and “portable storage device” for your org
Write a short definition that an auditor can test:
- External system: any endpoint not managed by your enterprise device management and not under your security monitoring authority.
- Portable storage device: USB mass storage, external SSD/HDD, SD cards, and any removable media that stores data.
Make the definition match your technical controls. If you cannot detect it, you cannot enforce it.
2) Decide your restriction model (the “ODP” parameter)
AC-20(2) expects organization-defined restrictions. Common models:
- Prohibit-by-default: no organization-owned media may be used on external systems.
- Allow-list by role + case: only specific roles (for example, incident response) with documented approvals can use media externally, and only for approved purposes.
- Allow-list by device: only specially hardened “external-use” drives can be used, with encryption and logging requirements.
- Allow-list by destination: only specific external systems (for example, customer-managed devices under contract) are allowed, with written approval.
Pick one model and document it as the control statement. 1
3) Establish authorization and accountability
Create a lightweight workflow:
- Requester, business justification, data classification, destination external system description, and time window.
- Approver (data owner + security, or delegated authority).
- Required safeguards (encryption, malware scan, labeling, chain-of-custody).
- Return/secure disposal requirement after use.
Daydream tip: In Daydream, map AC-20(2) to a control owner, a repeatable procedure, and recurring evidence artifacts so you are always assessment-ready instead of scrambling per audit. 1
4) Enforce restrictions with technical controls
Assessors will not accept “policy only” if you have endpoints capable of enforcement. Implement a combination:
- Device control to block USB mass storage by default and allow only approved device IDs (serial-based allow-list).
- Encryption enforcement on portable storage (require hardware-encrypted drives or managed software encryption with strong authentication).
- Endpoint controls that prevent mounting on unmanaged endpoints where feasible (for example, restricting write access, requiring managed host).
- Logging and alerting for removable media insert events and file transfer activity where your tools support it.
Your goal is to make “unauthorized external use” hard or detectable, and to prove that authorized use is bounded by conditions.
5) Build a controlled inventory for organization-issued portable media
You need an authoritative list of:
- Device identifier (serial), model, encryption capability
- Custodian/assignee, issue date, return date
- Approved external-use flag (yes/no)
- Current status (active, lost, retired, destroyed)
Tie this to your asset management process. Treat portable media like laptops: issued, tracked, returned.
6) Define exception handling and compensating controls
External use sometimes happens under pressure. Create an exception path that still leaves evidence:
- Emergency approval with retrospective review.
- Compensating controls: data minimization, time-bound access, immediate malware scanning on re-entry, incident ticket if loss suspected.
7) Operationalize ongoing monitoring and review
Put the control on rails:
- Review exception tickets and external-use approvals on a recurring cadence.
- Sample logs to confirm enforcement works (block events, allow events, alerts).
- Reconcile inventory (assigned devices match active users; retired devices are destroyed or securely wiped).
Required evidence and artifacts to retain
Keep evidence in an assessor-friendly package aligned to the requirement language: “restricted,” “authorized individuals,” “external systems.”
Minimum evidence set:
- Policy / standard defining restrictions for organization-controlled portable storage on external systems. 1
- Authorization workflow artifacts: completed requests, approvals, and time bounds.
- Device inventory of portable storage devices with unique identifiers and custodians.
- Technical configuration evidence: screenshots/exports from device control/MDM/EDR showing default block and allow-list rules.
- Logs showing enforcement and monitoring (USB insert events, block events, alerts, and response tickets).
- Exception register with justification, approvals, compensating controls, and closure evidence.
- Training/awareness proof for the authorized roles (optional but helpful).
Common exam/audit questions and hangups
Expect these questions and pre-answer them in your control narrative:
- “Define external system. Is a partner-managed device external?”
- “Show me how you prevent a standard user from using a corporate USB on a home PC.”
- “Who is authorized, and where is that authorization documented?”
- “How do you know which USB drives are organization-controlled?”
- “How do you detect violations, and what happens when you detect them?”
- “Show evidence for a recent approved external-use event end-to-end.”
Hangup to avoid: auditors often see “encrypted USB drives” as AC-19/MP territory; you must explicitly connect the encryption program to the restriction on external systems required by AC-20(2). 1
Frequent implementation mistakes and how to avoid them
-
Mistake: Policy bans it, but endpoints allow it.
Fix: implement device control default-deny and show configuration evidence. -
Mistake: You track laptops, not portable media.
Fix: add portable storage to asset inventory with serial numbers and custody. -
Mistake: “Authorized individuals” is implied, not documented.
Fix: maintain a role-based authorization list plus per-event approvals. -
Mistake: Exceptions become the real process.
Fix: require compensating controls and periodic exception review with closure. -
Mistake: Unclear boundary of “external systems.”
Fix: define it in a way you can test operationally (managed vs unmanaged).
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this specific enhancement, so treat this as a baseline control expectation rather than a “named case law” item. 1
Risk lens for operators:
- External systems dilute your controls: you may lose visibility into malware, copying, and onward sharing.
- Portable storage is easy to misplace and hard to monitor outside your boundary.
- The material failure mode in assessments is usually missing evidence: you cannot show restrictions are enforced and tied to authorized individuals. 1
Practical 30/60/90-day execution plan
First 30 days (establish control shape and stop the bleeding)
- Name a control owner and backup owner; write the AC-20(2) control statement with your organization-defined restriction model. 1
- Publish a short standard: default prohibition, allowed use cases, approval path, and consequences.
- Turn on or tighten endpoint device control where already available: block USB mass storage by default; define an initial allow-list process.
- Stand up a portable media inventory (even if initially a controlled spreadsheet owned by ITAM/SecOps).
Days 31–60 (enforce, instrument, and prove)
- Implement the approval workflow in your ticketing system with required fields (purpose, data type, destination).
- Issue “external-use” drives only (managed, encrypted, uniquely identified).
- Configure logging and alerts for removable media events; route to SecOps with a triage playbook.
- Run a tabletop test: request approval, issue a device, attempt external use, capture logs, and file the closure evidence.
Days 61–90 (stabilize operations and harden the audit package)
- Build recurring reviews: exception review, inventory reconciliation, and sample-based log review.
- Document a concise assessor packet: policy, workflow, inventory sample, configuration exports, log samples, and exception register.
- In Daydream, map AC-20(2) to the control owner, procedure, and recurring evidence artifacts so the control stays “ready” and doesn’t regress between assessments. 1
Frequently Asked Questions
Does AC-20(2) apply to personally owned USB drives employees bring from home?
The enhancement text targets “organization-controlled portable storage devices,” so your direct requirement focus is on organization-issued media. Many programs still ban or restrict personally owned media under related removable media controls, but that is separate from the AC-20(2) wording. 1
What counts as an “external system” in practice?
Treat any endpoint not managed by your device management and not under your monitoring authority as external. Write that definition into the standard so approvals and enforcement have a testable boundary. 1
Is encryption alone enough to satisfy AC-20(2)?
Encryption reduces exposure if a device is lost, but AC-20(2) requires restricting use on external systems by authorized individuals under defined conditions. You still need an authorization model and enforcement or detection that prevents uncontrolled external use. 1
We have legitimate air-gapped transfers. How do we comply without blocking operations?
Create an “external-use media” program: issue specific drives, limit who can request them, require approvals, and apply chain-of-custody plus logging on re-entry. Document those restrictions as your organization-defined parameter for the control. 1
What evidence will an assessor ask for first?
They usually start with your written restriction standard, proof of who is authorized, and proof that device control settings enforce the restriction. After that, they ask for logs and a few recent approval records to validate operation. 1
How do we keep this from becoming a paperwork-only control?
Make enforcement the default (block by policy in device control) and treat approvals as an allow-list mechanism tied to specific device IDs and users. Use Daydream to track the owner, procedure, and recurring evidence so drift shows up before the audit does. 1
Footnotes
Frequently Asked Questions
Does AC-20(2) apply to personally owned USB drives employees bring from home?
The enhancement text targets “organization-controlled portable storage devices,” so your direct requirement focus is on organization-issued media. Many programs still ban or restrict personally owned media under related removable media controls, but that is separate from the AC-20(2) wording. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
What counts as an “external system” in practice?
Treat any endpoint not managed by your device management and not under your monitoring authority as external. Write that definition into the standard so approvals and enforcement have a testable boundary. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Is encryption alone enough to satisfy AC-20(2)?
Encryption reduces exposure if a device is lost, but AC-20(2) requires restricting use on external systems by authorized individuals under defined conditions. You still need an authorization model and enforcement or detection that prevents uncontrolled external use. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
We have legitimate air-gapped transfers. How do we comply without blocking operations?
Create an “external-use media” program: issue specific drives, limit who can request them, require approvals, and apply chain-of-custody plus logging on re-entry. Document those restrictions as your organization-defined parameter for the control. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence will an assessor ask for first?
They usually start with your written restriction standard, proof of who is authorized, and proof that device control settings enforce the restriction. After that, they ask for logs and a few recent approval records to validate operation. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
How do we keep this from becoming a paperwork-only control?
Make enforcement the default (block by policy in device control) and treat approvals as an allow-list mechanism tied to specific device IDs and users. Use Daydream to track the owner, procedure, and recurring evidence so drift shows up before the audit does. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream