Prevent unauthorized users or groups from installing or using hardware, such as external drives, peripheral devices, or unapproved internal hardware components, by enforcing hardware usage policies and technical controls. This includes disabling USB ports, restricting driver installation, and implementing endpoint security tools to monitor and block unapproved devices. This mitigation can be implemented through the following measures:
Disable USB Ports and Hardware Installation Policies:
Deploy Endpoint Protection and Device Control Solutions:
Harden BIOS/UEFI and System Firmware:
Restrict Peripheral Devices and Drivers:
Disable Bluetooth and Wireless Hardware:
Logging and Monitoring:
Tools for Implementation
USB and Device Control:
Endpoint Monitoring:
Hardware Whitelisting:
BIOS/UEFI Security:
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1052 | Exfiltration Over Physical Medium |
Limit the use of USB devices and removable media within a network. |
|
.001 | Exfiltration over USB |
Limit the use of USB devices and removable media within a network. |
||
Enterprise | T1200 | Hardware Additions |
Block unknown devices and accessories by endpoint security configuration and monitoring agent. |
|
Enterprise | T1674 | Input Injection |
Limit the use of USB devices and removable media within a network. |
|
Enterprise | T1219 | Remote Access Tools |
Block the use of IP-based KVM devices within the network if they are not required. |
|
.003 | Remote Access Hardware |
Block the use of IP-based KVM devices within the network if they are not required. |
||
Enterprise | T1091 | Replication Through Removable Media |
Limit the use of USB devices and removable media within a network. |