Security Basics mailing list archives

checklist for "safe" usb device usage from one system to another


From: dongle <bakerga () yahoo com>
Date: Wed, 15 Oct 2008 02:53:45 -0700 (PDT)

Hello

Looking for a checklist of things to do from a manual
user interaction perspective, not GPO or local
computer settings, to do when using usb drives and/or
devices to jump data from a closed system to a system
connect to the internet.

This would be policy and a type of procedural guide or
checklist given when an exception to use these devices
is granted to be held accountable and mitigate as much
of the risk as possible  if such “unwanted” data was
to make it from one system to the other.

Trying to prevent malware, virus, any thing “unwanted”
that I cannot think of, etc...

One thing the checklist might include:

Devices with non-volatile memory will maintain the
data written to them for an extended time without
external power being supplied to the device so devices
should be powered off for at least 60 seconds before
moving from on system to the other. For example
cameras, camera phones...if they are being used to
transfer pictures, which might be the case in this
scenario (this came from Sharing Peripherals Across
the Network STIG, V1R1)

Any input greatly appreciated…

-glb


Current thread: