ISM-1418

If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.

Topic
Device access control software
Applicable to
all

History

Priority
must
Mar 2022
If there is no business requirement for reading from removable media and devices, such functionality is disabled via the use of device access control software or by disabling external communication interfaces.
Existing language for the use of device access control software has been standardised around reading from and writing to both removable media and devices.
Dec 2021
Unauthorised removable media and devices are prevented from being connected to workstations and servers via the use of device access control software or by disabling external communication interfaces in operating systems.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
Sep 2020
Device access control software is implemented on workstations and servers to prevent unauthorised devices from being connected.
Security controls 1418 and 0345 were amended to ensure consistency of terminology with other security controls in this section.
Aug 2020
Endpoint device control software is implemented on workstations and servers to prevent unauthorised devices from being used.
2015
Endpoint device control software must be used within SOEs to prevent unauthorisedremovable media and devices from being used with workstations and servers.