Limit Hardware Installation

Prevent unauthorized users or groups from installing or using hardware, such as external drives, peripheral devices, or unapproved internal hardware components, by enforcing hardware usage policies and technical controls. This includes disabling USB ports, restricting driver installation, and implementing endpoint security tools to monitor and block unapproved devices. This mitigation can be implemented through the following measures:

Disable USB Ports and Hardware Installation Policies:

  • Use Group Policy Objects (GPO) to disable USB mass storage devices:
    • Navigate to Computer Configuration > Administrative Templates > System > Removable Storage Access.
    • Deny write and read access to USB devices.
  • Whitelist approved devices using unique serial numbers via Windows Device Installation Policies.

Deploy Endpoint Protection and Device Control Solutions:

  • Use tools like Microsoft Defender for Endpoint, Symantec Endpoint Protection, or Tanium to monitor and block unauthorized hardware.
  • Implement device control policies to allow specific hardware types (e.g., keyboards, mice) and block others.

Harden BIOS/UEFI and System Firmware:

  • Set strong passwords for BIOS/UEFI access.
  • Enable Secure Boot to prevent rogue hardware components from loading unauthorized firmware.

Restrict Peripheral Devices and Drivers:

  • Use Windows Device Manager Policies to block installation of unapproved drivers.
  • Monitor hardware installation attempts through endpoint monitoring tools.

Disable Bluetooth and Wireless Hardware:

  • Use GPO or MDM tools to disable Bluetooth and Wi-Fi interfaces across systems.
  • Restrict hardware pairing to approved devices only.

Logging and Monitoring:

  • Enable logging for hardware installation events in Windows Event Logs (Event ID 20001 for Device Setup Manager).
  • Use SIEM solutions (e.g., Splunk, Elastic Stack) to detect unauthorized hardware installation activities.

Tools for Implementation

USB and Device Control:

  • Microsoft Group Policy Objects (GPO)
  • Microsoft Defender for Endpoint
  • Symantec Endpoint Protection
  • McAfee Device Control

Endpoint Monitoring:

  • EDRs
  • OSSEC (open-source host-based IDS)

Hardware Whitelisting:

  • BitLocker for external drives (Windows)
  • Windows Device Installation Policies
  • Device Control

BIOS/UEFI Security:

  • Secure Boot (Windows/Linux)Firmware management tools like Dell Command Update or HP Sure Start
ID: M1034
Version: 1.1
Created: 11 June 2019
Last Modified: 18 December 2024

Techniques Addressed by Mitigation

Domain ID Name Use
Enterprise T1052 Exfiltration Over Physical Medium

Limit the use of USB devices and removable media within a network.

.001 Exfiltration over USB

Limit the use of USB devices and removable media within a network.

Enterprise T1200 Hardware Additions

Block unknown devices and accessories by endpoint security configuration and monitoring agent.

Enterprise T1674 Input Injection

Limit the use of USB devices and removable media within a network.

Enterprise T1219 Remote Access Tools

Block the use of IP-based KVM devices within the network if they are not required.

.003 Remote Access Hardware

Block the use of IP-based KVM devices within the network if they are not required.

Enterprise T1091 Replication Through Removable Media

Limit the use of USB devices and removable media within a network.