🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Compliance Checklist for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.4: Validating Removable Test Media for Malicious Code

A practical guide to build a NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance checklist for MA.L2-3.7.4 that ensures removable test media are validated for malicious code before use.

•
April 04, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

MA.L2-3.7.4 requires organizations operating under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 to validate removable test media for malicious code before connecting it to systems that process Controlled Unclassified Information (CUI) or production networks; this post gives a practical Compliance Framework–focused checklist, technical actions, and small-business examples you can implement immediately.

What MA.L2-3.7.4 Requires (Compliance Framework context)

Within the Compliance Framework practice, the key objective of MA.L2-3.7.4 is to prevent malware introduced via removable test media (USB drives, SD cards, external HDDs, test-only devices) from compromising organizational systems. Compliance Framework expects documented policies, consistent technical controls, and verifiable evidence that each removable medium used for testing was scanned, sanitized, or otherwise validated before use in test environments that have access to CUI or sensitive networks.

Practical Implementation Checklist

Key Objectives

Define the specific goals your checklist must meet: (1) prevent malware introduction via removable media, (2) maintain an auditable chain of custody and scan results, (3) ensure test media are used only in isolated, instrumented environments, and (4) provide repeatable procedures that support evidence collection for audits and POAMs. For Compliance Framework alignment, map each checklist item to MA.L2-3.7.4 and to any local policy clauses on media handling.

Implementation Notes — policies and process

Create a short, accessible policy that states: who can bring test media onto premises, who approves it, which scan/sandbox steps are mandatory, how long results are retained, and when media must be disposed of or revalidated. Require pre-approval for all test media via a ticket or intake form capturing origin, vendor, hash (if provided), date received, and approving manager. Implement a written procedure: intake → initial quarantine → static scan → behavioral/sandbox analysis (if flagged) → decision (approve/deny/clean) → documented evidence stored in your configuration management database (CMDB) or ticket.

Technical Controls and step-by-step checks

Make these technical checks part of your checklist: 1) Physically quarantine new media and label it; 2) Mount read-only when possible (e.g., Linux: mount -o ro /dev/sdb1 /mnt/test) to prevent autorun; 3) Compute SHA-256 hashes for files and store them: sha256sum /mnt/test/* > /var/log/media-hashes-YYYYMMDD.txt; 4) Run signature-based scans (ClamAV: clamscan -r --infected /mnt/test) and enterprise AV/EDR scans (CrowdStrike, SentinelOne, Windows Defender with up-to-date definitions); 5) Run rule-based scans (YARA: yara -r rules.yar /mnt/test) and regular-expression content checks for known indicators; 6) Execute suspicious binaries in an isolated sandbox (Cuckoo, any commercially supported sandbox) or on an isolated test VLAN/air-gapped VM with a snapshot to revert; 7) For firmware/test device updates, verify vendor-signed firmware and validate checksums or digital signatures before applying; 8) Disable autorun/autorun.inf handling via Group Policy and endpoint configuration to prevent automatic execution.

Verification, logging, and evidence collection

Record every validation step in your evidence repository: ticket ID, operator, tools used, signature/EDR output, SHA-256 file hashes, sandbox behavior reports (network calls, spawned processes, persistence attempts), and the final approval decision. Forward logs to your SIEM or log server with timestamps and retention that meet your retention policy (typical: 1–3 years for audit-readiness). Ensure the checklist requires signed approval from the environment owner before media is introduced into any environment that processes CUI.

Real-world small business examples and scenarios

Example A — Small software vendor: A dev team receives sample USB devices from a customer to reproduce a field issue. The checklist requires the hardware be handed to IT, IT computes SHA-256 checksums and runs ClamAV and a YARA rule set, then authorizes a dev-only VM on an isolated VLAN to test the device. If the device needs firmware updates, IT verifies vendor signatures and applies updates only on the isolated VM. Example B — Electronics repair shop: Techs receive SD cards from customers for diagnostics. They must label the media, run a quick signature and behavioral scan, create a snapshot of the test workstation, and record results in a ticket. If malware is detected, the device is returned to the owner with a standard remediation letter and a workflow for safe disposal or vendor follow-up.

Risk of not implementing MA.L2-3.7.4 and compliance tips

Failure to validate removable test media increases risks of malware infection, lateral movement to CUI environments, data exfiltration, ransomware, and supply-chain compromise; it also creates audit findings, potential contract breaches with DoD or prime contractors, and costly incident response. Compliance tips: automate intake and scanning where possible (use scripts that mount read-only, compute hashes, call Av/EDR APIs, and attach reports to tickets), maintain a baseline image for isolated test VMs, perform periodic tabletop exercises to validate procedures, train staff on the intake process, and include removable media validation in internal audits and POA&Ms. For evidence preservation, ensure your SIEM correlates media-intake events with workstation logs and network segmentation changes.

Summary

To comply with MA.L2-3.7.4 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, build a short, enforceable checklist that covers policy, intake, read-only handling, multi-engine scanning, sandbox/isolated testing, logging, and approval gates; map each checklist item to Compliance Framework objectives, automate where possible, and maintain auditable evidence. For small businesses, modest investments in isolation VMs, scripting, and disciplined intake procedures dramatically reduce risk and provide the documentation auditors and prime contractors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes