AC-20(4): Network Accessible Storage Devices — Prohibited Use

AC-20(4) requires you to ban specific network-accessible storage devices from being used on external systems, then prove the ban is enforced in practice. Operationally, that means defining what is prohibited, blocking it with technical controls (not just policy), monitoring for violations, and retaining evidence that your restrictions apply whenever your users or workloads touch third-party or internet-facing environments. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Key takeaways:

  • Define “prohibited network-accessible storage devices” in plain terms your teams can implement and assess. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • Enforce the prohibition with preventive technical controls plus detective monitoring and response. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • Keep assessment-ready artifacts: configuration proofs, logs, exceptions, and third-party boundary documentation. (NIST SP 800-53 Rev. 5 OSCAL JSON)

The ac-20(4): network accessible storage devices — prohibited use requirement is a narrow control enhancement with a common failure mode: teams treat it as an “acceptable use” statement instead of a technically enforced restriction at external boundaries. The control language is short, but your implementation has to be unambiguous because assessors will ask two questions: (1) what exactly is prohibited, and (2) how do you prevent or detect its use when people operate in external systems.

“External systems” is where the operational risk concentrates. It includes third-party environments, cloud services outside your authorization boundary, partner networks, and any environment you do not fully control. If your workforce can move data into or out of those environments using network-accessible storage, you need clear prohibitions and control points that are durable against workarounds.

This page translates AC-20(4) into a fast execution plan: scoping decisions, concrete control steps, evidence you should retain, and the exam questions that typically stall audits. Where tooling helps, Daydream fits as a system of record to assign ownership, track exceptions, and keep recurring evidence artifacts organized for assessment readiness. (NIST SP 800-53 Rev. 5)

Regulatory text

Requirement (excerpt): “Prohibit the use of {{ insert: param, ac-20.04_odp }} in external systems.” (NIST SP 800-53 Rev. 5 OSCAL JSON)

What an operator must do with this text

You must do three things, in this order:

  1. Fill in the organization-defined parameter (ODP). The control expects you to specify the exact classes of “network accessible storage devices” you prohibit. If you do not define the ODP, you have not implemented the requirement as written. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  2. Apply the prohibition to “external systems.” Your scope must include scenarios where users, endpoints, and workloads interact with systems outside your security boundary. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  3. Make it real in operations. A policy statement alone rarely satisfies assessors; you need technical controls and monitoring that demonstrate the prohibition is enforced and violations are handled. (NIST SP 800-53 Rev. 5)

Plain-English interpretation

AC-20(4) means: pick the network-accessible storage device types your organization does not allow and block their use whenever work happens in external systems. (NIST SP 800-53 Rev. 5 OSCAL JSON)

In practice, “network-accessible storage devices” can include consumer or unmanaged file sync, remote drives, browser-based storage plugins, and other mechanisms that let a user mount, map, or otherwise access storage over a network path. The control does not tell you which ones to ban; it tells you to define the list and enforce it. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Who it applies to

Entity scope

  • Federal information systems and contractor systems handling federal data that implement NIST SP 800-53 controls (including via program requirements, ATO packages, or customer security addenda). (NIST SP 800-53 Rev. 5 OSCAL JSON)

Operational scope (where you enforce)

AC-20(4) becomes relevant anywhere your users or workloads can touch external systems, including:

  • End-user endpoints accessing third-party collaboration or storage services
  • Corporate networks egressing to the internet where users can mount remote storage
  • Workloads deployed in third-party-hosted environments or partner networks
  • Administrative access paths used by IT and engineering (remote support, contractor tooling)

Your scoping decision should be written down as part of the ODP definition and boundary statement so an assessor can see exactly where the prohibition applies and where it does not. (NIST SP 800-53 Rev. 5)

What you actually need to do (step-by-step)

Step 1: Define the prohibited-use ODP clearly (policy-ready and engineer-ready)

Create an AC-20(4) ODP statement that includes:

  • Prohibited device/service categories (by type and examples)
  • What “use” means (mounting, syncing, connecting, mapping drives, uploading regulated data)
  • What “external systems” means for your environment (named categories: third parties, personal accounts, partner networks, unmanaged cloud tenants)
  • Allowed alternatives (approved enterprise storage, approved managed file transfer, approved collaboration tenants)

Keep the definition short enough to enforce, but specific enough that a user cannot claim ambiguity. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Step 2: Map owners and control points (so the prohibition is enforceable)

Assign a single accountable owner (control owner) and named operators for:

  • Endpoint management (MDM/EDR)
  • Network security (SWG/proxy, firewall, CASB where applicable)
  • Identity (SSO, conditional access)
  • Third-party risk management (contractual restrictions for third parties handling your data)

Daydream is useful here as the place to map AC-20(4) to an owner, a procedure, and recurring evidence artifacts so the control survives staff changes and audits. (NIST SP 800-53 Rev. 5)

Step 3: Implement preventive technical controls

Pick control families that match your architecture; assessors care that the prohibition is actually enforced.

Common enforcement patterns:

  • Endpoint controls: block unapproved storage clients, block drive-mapping to unapproved network locations, restrict removable media if it becomes a pathway to external sync.
  • Identity controls: restrict sign-in to unapproved storage tenants; require managed devices for access to approved storage.
  • Network controls: block known storage domains and protocols for prohibited services; restrict outbound connections that support mounting remote storage.
  • Cloud controls: prevent data movement from sanctioned repositories to unsanctioned external systems through tenant restrictions and sharing controls.

Document each control as: policy rule → technical enforcement point → validation method. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Step 4: Add detective monitoring and a response path

Preventive controls fail in edge cases. Put in place:

  • Alerts for attempted access to prohibited storage services
  • DLP signals for sensitive data moving to unsanctioned destinations
  • Triage steps: confirm event, identify user/device, contain, and record disposition
  • Exception handling: if a business unit claims “need,” route through a formal exception workflow tied to risk acceptance

Your goal is to show that violations become tickets with outcomes, not “noise in a dashboard.” (NIST SP 800-53 Rev. 5)

Step 5: Control third-party and contractor pathways

AC-20(4) often breaks at contractors:

  • Contractors using their own devices to access external systems
  • Third parties moving your data into their storage tools “for convenience”

Add contract/security addendum language that requires adherence to your prohibited-use list when handling your data, and verify via onboarding controls (managed VDI, managed identity, approved transfer methods). Track third-party exceptions explicitly. (NIST SP 800-53 Rev. 5)

Step 6: Validate and test (make it assessable)

Run practical checks:

  • Attempt to connect to a prohibited storage service from a managed endpoint
  • Attempt from a non-managed endpoint (should be blocked by conditional access or network controls, depending on your model)
  • Confirm logs exist and alerts fire
  • Confirm your helpdesk and SOC know the expected handling steps

Record the test and results as evidence. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Required evidence and artifacts to retain

Retain evidence that proves definition, enforcement, and operation:

Governance artifacts

  • AC-20(4) ODP definition (the filled-in “prohibited use” statement) (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • AC-20(4) procedure/runbook: control intent, enforcement points, monitoring, exceptions (NIST SP 800-53 Rev. 5)
  • System boundary notes showing what you treat as “external systems” for this control (NIST SP 800-53 Rev. 5)

Technical artifacts

  • Endpoint policy configuration exports (application allow/deny, device restrictions)
  • Network policy snapshots (proxy/SWG rules, firewall egress rules, DNS filtering rules)
  • Identity policy exports (conditional access rules, tenant restrictions)
  • Sample logs showing blocked attempts or detections, plus ticket IDs and disposition notes

Operational artifacts

  • Exception register with approvals, scope, compensating controls, and expiration
  • Periodic access review or control review notes (who reviewed the prohibited list and why changes were made)
  • Training or user notice artifacts (short comms that tell users what is prohibited and what to do instead)

Daydream can serve as the evidence binder: control mapping, ownership, scheduled evidence requests, and an exception workflow that ties back to AC-20(4). (NIST SP 800-53 Rev. 5)

Common exam/audit questions and hangups

Assessors commonly press on these points:

  1. “What exactly is the ODP?” If you cannot point to the filled-in prohibited list, you will stall. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  2. “Show me it’s prohibited in external systems, not just internal.” Be ready to show boundary logic and egress/identity controls that apply outside your environment. (NIST SP 800-53 Rev. 5)
  3. “Is this enforced or just a policy?” Bring config evidence and test results. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  4. “How do you handle exceptions?” Show a time-bounded exception with risk acceptance and compensating controls.

Frequent implementation mistakes (and how to avoid them)

  • Mistake: Leaving the ODP vague (“unapproved storage”). Fix: name categories and concrete examples; define what “external systems” includes for your program. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • Mistake: Blocking a few domains but ignoring endpoints and identity. Fix: implement at least two layers (endpoint + identity, or endpoint + network) so common bypasses fail. (NIST SP 800-53 Rev. 5)
  • Mistake: No evidence of operation. Fix: store periodic config exports and a small set of representative detections/tickets. Daydream helps by scheduling evidence collection and keeping it tied to the requirement. (NIST SP 800-53 Rev. 5)
  • Mistake: Contractors sit outside enforcement. Fix: require managed access paths and write contractor restrictions into onboarding and third-party requirements. (NIST SP 800-53 Rev. 5)

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so treat enforcement risk as indirect: AC-20(4) weaknesses commonly surface during authorization reviews, customer assessments, and incident investigations where data movement to unsanctioned storage becomes a root cause question. The operational risk is loss of control over sensitive data once it lands in external storage you do not govern, monitor, or retain. (NIST SP 800-53 Rev. 5)

Practical 30/60/90-day execution plan

First 30 days (stabilize the requirement)

  • Name the AC-20(4) control owner and operators; create the ODP definition and get formal approval. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • Identify current approved storage and transfer methods so business teams have a workable alternative.
  • Document “external systems” categories for your boundary statement. (NIST SP 800-53 Rev. 5)

By 60 days (enforce and instrument)

  • Deploy endpoint and identity restrictions aligned to the prohibited list; implement network blocks where appropriate.
  • Stand up alerting and ticketing for violations; write a short SOC/helpdesk handling procedure.
  • Create the exception workflow with required fields and approvals; track it in Daydream for audit-ready reporting. (NIST SP 800-53 Rev. 5)

By 90 days (prove operation)

  • Run validation tests and retain results as evidence; confirm logs and tickets are generated end-to-end. (NIST SP 800-53 Rev. 5 OSCAL JSON)
  • Review third-party/contractor access paths; add contract language and onboarding controls that align with the prohibition.
  • Perform a control review: confirm the prohibited list still matches current tools, threats, and business reality; capture review notes as evidence. (NIST SP 800-53 Rev. 5)

Frequently Asked Questions

What counts as “network-accessible storage devices” for AC-20(4)?

The control expects you to define this via the organization-defined parameter, so you choose the categories to prohibit and document them. Make the definition specific enough to configure endpoint, identity, and network controls against it. (NIST SP 800-53 Rev. 5 OSCAL JSON)

What is an “external system” in this requirement?

“External system” generally means a system outside your authorization or security boundary, including third-party environments and unmanaged cloud tenants. Write your boundary interpretation down and align enforcement points to that definition. (NIST SP 800-53 Rev. 5)

Is a written policy enough to satisfy AC-20(4)?

A policy is necessary but rarely sufficient on its own for assessment readiness. Plan to show technical enforcement (configurations) and operational evidence (logs, tickets, tests). (NIST SP 800-53 Rev. 5)

How do we handle legitimate business needs that conflict with the prohibition?

Use a formal exception process with explicit scope, compensating controls, and an expiration. Keep an exception register so you can show the auditor that “temporary” access does not become permanent drift. (NIST SP 800-53 Rev. 5)

How do contractors and third parties fit into AC-20(4)?

If they access external systems while handling your data, they can become the main path for prohibited storage use. Put the prohibition in onboarding requirements and third-party terms, then constrain access through managed identities or managed virtual access paths. (NIST SP 800-53 Rev. 5)

What evidence should we hand an assessor first?

Provide the filled-in ODP statement, then configuration proofs for the primary enforcement points, then a small set of representative logs/tickets showing the control operates. Keeping these mapped in Daydream reduces scramble during audits. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Frequently Asked Questions

What counts as “network-accessible storage devices” for AC-20(4)?

The control expects you to define this via the organization-defined parameter, so you choose the categories to prohibit and document them. Make the definition specific enough to configure endpoint, identity, and network controls against it. (NIST SP 800-53 Rev. 5 OSCAL JSON)

What is an “external system” in this requirement?

“External system” generally means a system outside your authorization or security boundary, including third-party environments and unmanaged cloud tenants. Write your boundary interpretation down and align enforcement points to that definition. (NIST SP 800-53 Rev. 5)

Is a written policy enough to satisfy AC-20(4)?

A policy is necessary but rarely sufficient on its own for assessment readiness. Plan to show technical enforcement (configurations) and operational evidence (logs, tickets, tests). (NIST SP 800-53 Rev. 5)

How do we handle legitimate business needs that conflict with the prohibition?

Use a formal exception process with explicit scope, compensating controls, and an expiration. Keep an exception register so you can show the auditor that “temporary” access does not become permanent drift. (NIST SP 800-53 Rev. 5)

How do contractors and third parties fit into AC-20(4)?

If they access external systems while handling your data, they can become the main path for prohibited storage use. Put the prohibition in onboarding requirements and third-party terms, then constrain access through managed identities or managed virtual access paths. (NIST SP 800-53 Rev. 5)

What evidence should we hand an assessor first?

Provide the filled-in ODP statement, then configuration proofs for the primary enforcement points, then a small set of representative logs/tickets showing the control operates. Keeping these mapped in Daydream reduces scramble during audits. (NIST SP 800-53 Rev. 5 OSCAL JSON)

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream