🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Secure Removable Media and Endpoints for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MP.L2-3.8.2: Tools, Configurations, and Best Practices

Practical, technical guidance for small businesses to meet MP.L2-3.8.2 by controlling removable media and endpoint storage of CUI with tools, configurations, and operational practices.

•
April 15, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to implement NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control MP.L2-3.8.2 for protecting Controlled Unclassified Information (CUI) on removable media and endpoints — with concrete tools, configurations, operational processes, and small-business examples that map directly to Compliance Framework expectations.

What MP.L2-3.8.2 requires (high level)

MP.L2-3.8.2 focuses on preventing unauthorized storage and movement of CUI onto removable media and non-approved endpoints, and on managing media lifecycle (use, authentication, encryption, sanitization, disposal). For Compliance Framework evidence you will need policy, technical controls, exception/approval records, inventory and logs showing enforcement, and sanitization/disposal procedures aligned to NIST SP 800-88.

Technical controls and tools — Windows

For Windows endpoints, use a combination of disk encryption (BitLocker/BitLocker To Go), Group Policy/Intune device restriction settings, and endpoint DLP/EDR. Key actionable settings: enable BitLocker with TPM+PIN and enforce BitLocker To Go for removable drives (use XTS-AES 256), configure Group Policy Computer Configuration → Administrative Templates → System → Removable Storage Access and set "All Removable Storage classes: Deny all access" or selectively enable "Removable Disks: Deny write access." To fully disable USB mass storage, set HKLM\SYSTEM\CurrentControlSet\Services\USBSTOR Start = 4 via Group Policy preferences or use a device installation restriction policy to allowlist only approved USB device IDs. Centralize recovery keys in Intune/AD to meet key escrow evidence requirements.

Technical controls and tools — macOS, iOS, and Android

On macOS enforce FileVault full-disk encryption, manage external drive access with an MDM (Jamf/Intune) profile that disables external volumes or enforces read-only access for unmanaged devices, and use configuration profiles to restrict attachment of USB/Thunderbolt storage. For mobile devices, use Mobile Device Management (MDM) to disable USB OTG and block unmanaged cloud backup of CUI; enforce managed apps and controlled document containers for data-at-rest and in-transit. Keep enrollment and policy assignment logs as Compliance Framework evidence.

Technical controls and tools — Linux and embedded devices

Linux endpoints can be hardened by blacklisting the usb_storage kernel module (create /etc/modprobe.d/blacklist-usb.conf with "blacklist usb_storage"), employing USBGuard or udev rules to allowlist devices, and using LUKS full-disk encryption with TPM2 or keyfile escrow to an enterprise key manager. For servers and embedded systems, disable unused ports in BIOS/UEFI and use OS-level policies to prevent mounting of removable media by non-admin users. Log kernel events and udev actions and forward them to your SIEM for attestation.

DLP, EDR, MDM, hardware-encrypted media, and logging

Deploy Data Loss Prevention (Symantec, McAfee DLP, Digital Guardian, Microsoft Purview) to block copy-to-removable-media operations or to require policy approval and encryption. EDR (Microsoft Defender for Endpoint, CrowdStrike) should alert on suspicious file copies and new device attachments. Use hardware-encrypted and FIPS-validated USB drives for approved exceptions and require asset tagging; maintain an inventory with serial numbers. Implement logging: enable file/object auditing on Windows (Event IDs 4663/4656 for file access), endpoint device attach logs, and retain logs for the period required by your contract — forward to a SIEM for automated alerting and reporting for auditors.

Operational controls: policy, approvals, sanitization, and training

Technical measures must be paired with documented procedures: a written removable media policy that defines allowed media types, an approval workflow for exceptions (who can approve, for how long), chain-of-custody and media inventory records, and sanitization/disposal processes following NIST SP 800-88 (clear, purge, destroy). Train users quarterly on why removable media are restricted, run tabletop exercises for lost media, and log approvals and returns in a simple ticketing system to create audit trails for Compliance Framework evidence.

Real-world small-business scenarios and step-by-step mitigations

Scenario A: A subcontractor hands over a USB with CUI. Mitigation: refuse unmanaged media; if acceptance is required, only accept hardware-encrypted, asset-tagged drives and log serial + purpose; ingest data directly to a controlled endpoint, then sanitize the drive per 800-88. Scenario B: Employee copies CUI to a personal cloud. Mitigation: block unmanaged cloud sync for managed files via DLP; revoke access and require removal using MDM's remote wipe for managed app containers; document the incident, notify stakeholders per incident response plan. These examples demonstrate the combination of policy, technical block/allow listings, and documented exception handling required for Compliance Framework auditors.

Risks of not implementing MP.L2-3.8.2

Failure to control removable media and endpoints risks data exfiltration, loss of CUI, contractual penalties, damage to reputation, and potential exclusion from DoD/contracting opportunities. Technically, unencrypted USBs and uncontrolled endpoints are high-probability vectors for malware/ransomware and unauthorized disclosure; from an audit perspective, lack of policies, logs, and key escrow means failing Compliance Framework assessment even if no breach has occurred.

Best practices and compliance tips (summary)

Start with a baseline: inventory endpoints, enable full-disk encryption everywhere, and deploy DLP + EDR. Implement allowlists rather than broad denies where operationally necessary, document all exceptions and retain approval records, escrow encryption keys centrally, and use asset-tagged, hardware-encrypted media for approved needs. Keep retention of logs and evidence aligned with contract requirements and perform periodic control testing (simulate a removable-media policy violation) to prove effectiveness. Finally, include the removable media policy and technical configuration details in your System Security Plan (SSP) and Plan of Action & Milestones (POA&M) so auditors see both the controls and remediation planning.

In summary, meeting MP.L2-3.8.2 requires layered defenses — encryption, endpoint/device controls, DLP/EDR, MDM, documented processes, and logging — all tied to a clear policy and exception workflow; for small businesses the practical path is: encrypt everything, block where possible, allow only vetted exceptions (hardware-encrypted drives with asset tracking), and keep demonstrable records and logs to satisfy Compliance Framework auditors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes