Lynis Security Controls
STRG-1840 - USB storage drivers
Disable drivers like USB storage when not used, to prevent unauthorized storage or data theft
How to solve
Nowadays, most systems have multiple USB ports available. Linux supports USB as well, including a wide variety of hardware devices which can be connected. One of the biggest threats for companies is data theft via USB sticks. They are small while still having a great capacity of data to store.
When a system does not need any USB devices to be plugged in, simply disable USB support from the BIOS of the system. Otherwise determine what kind of devices should be connected. If this is limited to keyboards and mouses, restrict other types of USB devices, like storage devices. On Linux this can be done by blacklisting drivers.
- Blacklist kernel modules (How to block kernel modules from being loaded)
Perform daily health checks of your environment, learn in-depth system hardening, and protect your systems better.Upgrade to Lynis Enterprise
Linux and Unix System Hardening
This information is provided as part of the Lynis community project. It is related to Lynis control STRG-1840. All information should be considered as-is, without guarantees. Any advice or snippets should be tested before implementing in production environments.
Lynis is a technical security audit tool for Unix flavors like Linux, macOS, AIX, Solaris, and *BSD. It is open source software and free to use. The project has an active community, including open development via GitHub.
Need more advanced features, like vulnerability scanning, or reporting installed software packages? Lynis Enterprise will collect more data and present it with an easy to use web interface.
Gain additional benefits: automating security audits, reporting, and the implementation of related security measures.
- Centralized management
- Prioritized plans
- Integration (API)
- Improvement snippets for tools like Ansible, Chef, Cfengine, Puppet, and SaltStack