MP-5(4): Cryptographic Protection

MP-5(4): Cryptographic Protection requires you to ensure removable media is protected with cryptography when it’s used to store or transport organizational data, and to be able to prove it in an assessment. Operationalize it by defining which media is in scope, mandating approved encryption and key management, enforcing it technically, and retaining repeatable evidence. 1

Key takeaways:

  • Treat this as a removable media encryption mandate with enforceable standards, not a policy statement. 1
  • Scope and exceptions drive audit outcomes; document both and make exceptions time-bound and risk-accepted. 2
  • Evidence is the control: configuration proofs, logs, and inventory-to-encryption mappings are what assessors ask for. 2

MP-5(4): Cryptographic Protection sits in the Media Protection (MP) family and is typically evaluated when your system handles sensitive federal data, regulated data, or mission-critical information that could be lost through portable storage. The operational reality is simple: removable media walks out of controlled environments. If you cannot demonstrate that portable storage is encrypted with approved cryptography, you inherit breach exposure, incident response cost, and assessment failure risk.

Most teams stumble on this requirement for one of two reasons. First, scope is fuzzy: “removable media” includes more than USB sticks, and your environment may include external drives, removable flash media in industrial devices, camera media, or contractor-supplied portable storage. Second, teams implement encryption but cannot show it consistently: no inventory, no enforcement, no key management story, and no evidence trail.

This page turns the mp-5(4): cryptographic protection requirement into an execution checklist a CCO, GRC lead, or control owner can assign, track, and defend during an audit. It focuses on decisions you must make, the technical guardrails that work in practice, and the artifacts you need ready on demand. 2

Regulatory text

Regulatory excerpt: “NIST SP 800-53 control MP-5.4.” 1

Operator meaning (what you must do): Implement cryptographic protection for removable media so that data stored on, or transported via, such media is protected against unauthorized disclosure. You must also be prepared to demonstrate the implementation through documented procedures and repeatable evidence appropriate to your system and data sensitivity. 2

Plain-English interpretation (what assessors expect)

Assessors generally evaluate MP-5(4) as: “Show me that portable/removable storage that can leave controlled custody is encrypted using your approved cryptographic approach, that keys are managed securely, and that users can’t bypass it without an approved exception.”

This breaks into four audit-friendly questions:

  1. What media is allowed and in scope?
  2. What encryption standard is required and how is it enforced?
  3. How are encryption keys protected and recoverable under control?
  4. How do you prove compliance continuously (not just on paper)?

Who it applies to (entity and operational context)

Entity types most commonly in scope

  • Federal information systems and components assessed against NIST SP 800-53. 2
  • Contractor systems handling federal data where NIST SP 800-53 controls are flowed down contractually or through program requirements. 2

Operational contexts where MP-5(4) becomes high-friction

  • Field operations where staff move data via external drives.
  • Build rooms, labs, and engineering environments exchanging artifacts offline.
  • Incident response workflows that write forensic images to portable media.
  • Third-party support where contractors request data drops on portable storage.

Assets in scope (practical scoping guide)

  • USB flash drives and external HDD/SSD.
  • Removable media used by specialized equipment (industrial controllers, medical devices, cameras).
  • Portable media used for backups or system images.
  • Any removable storage used to transport controlled organizational data.

What you actually need to do (step-by-step)

Step 1: Define scope and allowed use

  1. Write a removable media standard that answers: allowed media types, prohibited media types, approved brands/models (if applicable), and approved use cases (data transfer, boot media, backups). Keep it short and enforceable.
  2. Classify data allowed on removable media. Many programs prohibit certain data classes entirely; if you allow it, require encryption.
  3. Define ownership: name a control owner (typically IT Security or Endpoint Engineering) and a GRC owner for governance and exceptions.

Output: Removable Media Standard + in-scope asset list mapped to system boundaries.

Step 2: Set cryptographic requirements (what “encrypted” means in your program)

  1. Specify approved cryptographic protection (tooling and configuration baseline). Your standard should state what products/features meet the requirement in your environment.
  2. Decide the enforcement point:
    • Endpoint full-disk encryption for devices that store data locally plus removable media control features.
    • Removable media encryption (device-level or container-level) with mandatory encryption on write.
  3. Define key management expectations: who can recover data, where keys are stored, and how access is approved and logged.

Output: Cryptographic configuration baseline for removable media, including key custody and recovery process.

Step 3: Implement technical enforcement

  1. Control write access: restrict removable media use to managed endpoints (or approved kiosks) so you can enforce encryption.
  2. Require encryption on removable media: configure endpoint management so unencrypted removable media cannot be written to, or is automatically encrypted before use.
  3. Block or tightly control “unknown” media: prevent use of unapproved devices or require explicit authorization.
  4. Log events: collect logs showing media insertion, encryption status enforcement, and policy blocks.

Practical tip: If you can’t reliably enforce encryption, your next-best control is to prohibit removable media for controlled data and provide an alternative transfer path. Document the decision and the compensating workflow.

Output: Policy enforcement configuration + log sources enabled.

Step 4: Build the exception path (auditable and constrained)

  1. Create an exception request form with: business justification, data classification, duration, compensating controls, approving authority, and return/destruction plan.
  2. Time-box exceptions and require renewal with re-approval.
  3. Track exceptions centrally so you can show assessors a complete list and status.

Output: Exception register and approvals.

Step 5: Operationalize verification (continuous, not annual)

  1. Reconcile inventory vs. encryption status: maintain a register of approved removable media (or approved endpoints with removable media controls) and periodically confirm encryption enforcement works.
  2. Test recovery: prove you can recover encrypted media under controlled conditions without shared passwords or unmanaged keys.
  3. Train users and admins: focus training on what is allowed, how to request exceptions, and what to do when media is blocked.

Output: Periodic verification results + training record tied to the standard.

Required evidence and artifacts to retain

Keep artifacts that show design, implementation, and operation:

Design evidence

  • Removable Media Standard and Cryptographic Protection Standard (versioned, approved).
  • Data classification rules for removable media use (or prohibition statement).
  • Exception procedure and approval matrix.

Implementation evidence

  • Endpoint management configuration screenshots/exports showing removable media encryption enforcement.
  • Encryption tool configuration baseline for removable media.
  • Key management documentation: where keys live, who can access, how recovery works.

Operational evidence

  • Inventory or register of approved removable media (or control statement explaining how you manage by endpoint policy rather than device tracking).
  • Logs or reports demonstrating enforcement actions (blocks, required encryption, compliance status).
  • Exception register with approvals, expiry dates, and closure evidence.
  • Periodic control check results (spot checks, automated compliance reports).

Daydream-friendly packaging: Map MP-5(4) to a single control owner, a single operating procedure, and a short list of recurring evidence artifacts so audits become a pull from a predictable folder, not a scramble. 1

Common exam/audit questions and hangups

Assessors and auditors tend to ask:

  • “What removable media is permitted, and how do you enforce it?”
  • “Show me proof that unencrypted removable media cannot be used to store controlled data.”
  • “How do you manage encryption keys and recovery? Who can decrypt?”
  • “Do third parties ever bring media onsite, and what controls apply?”
  • “Show exceptions. How many, why, and when do they expire?”

Hangups that stall audits:

  • Policy says “encrypt,” but endpoint configuration doesn’t enforce it.
  • Teams can’t define “removable media” consistently across IT, OT, and lab environments.
  • Keys are stored in ways that bypass access controls (shared credentials, local-only recovery keys).
  • Exceptions exist in email threads with no register or closure.

Frequent implementation mistakes (and how to avoid them)

  1. Mistake: Treating “encrypted zip file” as the standard.
    Fix: define an approved approach and enforce it through managed tooling and key control. Document when file-level encryption is allowed and how keys are handled.

  2. Mistake: No ownership for removable media.
    Fix: assign a control owner with authority over endpoint policy and an approver for exceptions.

  3. Mistake: Allowing contractors to use their own media by default.
    Fix: require organizationally approved media or an approved transfer mechanism; route third-party needs through the exception workflow.

  4. Mistake: Evidence exists, but it’s not repeatable.
    Fix: standardize reports (monthly/quarterly, depending on your program) and store them in the same place with a naming convention.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this control, so you should treat enforcement risk as assessment and contractual compliance risk rather than citing specific public penalties. 1

Operational risk is straightforward: lost or stolen removable media can become a reportable incident depending on the data involved, and inability to demonstrate cryptographic protection increases the likelihood of adverse audit findings. Tie MP-5(4) to incident response playbooks: if encrypted media is lost, the evidentiary question becomes “prove it was encrypted and keys were protected.”

Practical 30/60/90-day execution plan

First 30 days (establish control shape)

  • Confirm scope: systems, data types, user groups, and third parties that use removable media.
  • Publish or update the Removable Media Standard and exception workflow.
  • Identify current technical controls and gaps (endpoint tooling, logging, key recovery).

By 60 days (enforce and document)

  • Implement enforcement for managed endpoints (block unapproved media, require encryption on write).
  • Stand up a central exception register and approval process.
  • Produce your first evidence set: configuration exports, sample enforcement logs, and inventory mapping.

By 90 days (prove repeatability)

  • Run a recurring compliance report and store it as your “operating” evidence.
  • Test key recovery under controlled conditions and document results.
  • Perform a tabletop for “lost removable media,” including how you would prove encryption status to stakeholders.

How to operationalize in a GRC program (assignment-ready)

Use a simple RACI so work moves:

  • Responsible: Endpoint Engineering / IT Security (technical enforcement)
  • Accountable: System Owner (accepts residual risk and exceptions)
  • Consulted: Legal/Privacy (data handling constraints), Procurement (third-party terms)
  • Informed: Helpdesk, affected business units

In Daydream, the practical win is a single control page that ties together owner, procedure, and the exact evidence list you will refresh on a schedule, so MP-5(4) is always assessment-ready. 1

Frequently Asked Questions

Does MP-5(4) require encrypting every USB drive, even for non-sensitive files?

Treat the requirement as data-driven: if organizational data in scope can be stored or transported on removable media, enforce encryption for that use case. If you allow removable media broadly, enforce encryption by default to avoid classification mistakes. 2

Can we meet MP-5(4) by banning removable media entirely?

Yes, if the ban is enforceable and you can show technical controls that prevent use (plus an exception path for true edge cases). Auditors typically accept prohibition as a valid risk treatment when it’s implemented, not just written. 2

What evidence is most persuasive in an assessment?

Configuration evidence that shows encryption is required, plus logs or reports demonstrating blocked writes or enforced encryption events. Pair that with an exception register to show governance for edge cases. 2

How should third-party access be handled for removable media?

Treat third-party media as higher risk: require organizationally approved media or a controlled transfer mechanism, and document approvals through the same exception workflow you use internally. Contract terms should align with your removable media standard. 2

What’s the minimum key management detail we need documented?

Document where encryption keys or recovery keys are stored, who can access them, how access is approved, and how recovery is performed and logged. If you can’t explain recovery, assessors may conclude encryption is ad hoc and not controlled. 2

We encrypt endpoints. Do we still need removable media encryption?

Endpoint encryption protects data on the endpoint drive. MP-5(4) is about removable media used to store or transport data; you still need controls that address what happens when data is written to removable storage and leaves custody. 2

Footnotes

  1. NIST SP 800-53 Rev. 5 OSCAL JSON

  2. NIST SP 800-53 Rev. 5

Frequently Asked Questions

Does MP-5(4) require encrypting every USB drive, even for non-sensitive files?

Treat the requirement as data-driven: if organizational data in scope can be stored or transported on removable media, enforce encryption for that use case. If you allow removable media broadly, enforce encryption by default to avoid classification mistakes. (Source: NIST SP 800-53 Rev. 5)

Can we meet MP-5(4) by banning removable media entirely?

Yes, if the ban is enforceable and you can show technical controls that prevent use (plus an exception path for true edge cases). Auditors typically accept prohibition as a valid risk treatment when it’s implemented, not just written. (Source: NIST SP 800-53 Rev. 5)

What evidence is most persuasive in an assessment?

Configuration evidence that shows encryption is required, plus logs or reports demonstrating blocked writes or enforced encryption events. Pair that with an exception register to show governance for edge cases. (Source: NIST SP 800-53 Rev. 5)

How should third-party access be handled for removable media?

Treat third-party media as higher risk: require organizationally approved media or a controlled transfer mechanism, and document approvals through the same exception workflow you use internally. Contract terms should align with your removable media standard. (Source: NIST SP 800-53 Rev. 5)

What’s the minimum key management detail we need documented?

Document where encryption keys or recovery keys are stored, who can access them, how access is approved, and how recovery is performed and logged. If you can’t explain recovery, assessors may conclude encryption is ad hoc and not controlled. (Source: NIST SP 800-53 Rev. 5)

We encrypt endpoints. Do we still need removable media encryption?

Endpoint encryption protects data on the endpoint drive. MP-5(4) is about removable media used to store or transport data; you still need controls that address what happens when data is written to removable storage and leaves custody. (Source: NIST SP 800-53 Rev. 5)

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream