Security Basics mailing list archives
checklist for "safe" usb device usage from one system to another
From: dongle <bakerga () yahoo com>
Date: Wed, 15 Oct 2008 02:53:45 -0700 (PDT)
Hello Looking for a checklist of things to do from a manual user interaction perspective, not GPO or local computer settings, to do when using usb drives and/or devices to jump data from a closed system to a system connect to the internet. This would be policy and a type of procedural guide or checklist given when an exception to use these devices is granted to be held accountable and mitigate as much of the risk as possible if such unwanted data was to make it from one system to the other. Trying to prevent malware, virus, any thing unwanted that I cannot think of, etc... One thing the checklist might include: Devices with non-volatile memory will maintain the data written to them for an extended time without external power being supplied to the device so devices should be powered off for at least 60 seconds before moving from on system to the other. For example cameras, camera phones...if they are being used to transfer pictures, which might be the case in this scenario (this came from Sharing Peripherals Across the Network STIG, V1R1) Any input greatly appreciated -glb
Current thread:
- checklist for "safe" usb device usage from one system to another dongle (Oct 15)