
Towards a Comprehensive USB Flash Drive Policy? 121
sconeu asks: "The company I work for is going through some growing pains. This is a -good- thing, but due to the growth, some changes are necessary. I'm the guy who does IT and IT policy, however I'm actually a developer by job description -- I was doing IT on the side. Anyways, we're going through growth, and one of the things we are trying to address is security.
Currently, our policy is wide-open (for internal machines). The owner has expressed some reservations about the increasing use of flash drives, in an overall security setting. Everyone involved here realizes that there's not much we can do against a malicious employee, but we're looking to avoid accidental data loss from USB sticks, and other solid-state storage media.
Has anyone on Slashdot dealt with this issue? What policies and protections did you end up putting in place, if any?"
Floppies? (Score:1)
Re:Floppies? (Score:1)
Re:Floppies? (Score:1)
Meeting over. Happy hour!
Re:Floppies? (Score:1)
How many floppies have you seen that can act as a wireless network adapter?
Re:Floppies? (Score:1)
Granted,it's probably more than the number of floppies that can be wireless nics, as I counted zero.
Re:Floppies? (Score:1)
A wireless network adapter cannot store 128M of "secret files", no. But it can transfer them elsewhere in a minute or so.. And possibly give more network access than you ever intended in the meantime, as well.
Re:Floppies? (Score:1)
Re:Floppies? (Score:2)
Dood! [sandisk.com]
Re:Floppies? (Score:2)
The model I linked to comes with a PCMCIA CF adapter and Windows drivers for ME, 2000, and XP.
Re:Floppies? (Score:2, Insightful)
But for what it's worth, we are not a bank or the military, so our policies
Re:Floppies? (Score:2)
In the Government (Score:1)
Re:In the Government (Score:2)
Re:In the Government (Score:1)
Re:In the Government (Score:2)
Re:In the Government (Score:2)
> Well at least my department anything
> that could be used as a mass storage
> device is forbidden.
Check your brain at the door...
Re:In the Government (Score:1)
Re: (Score:1)
policy proxification (Score:2)
Does this cut down on the ads and spyware for you, too?
Appropriate Technology (Score:2)
Hmmm... still have those floppy discs to deal with though....
Audit requirements are a bitch (Score:2, Insightful)
Re:Audit requirements are a bitch (Score:1)
Re:Audit requirements are a bitch (Score:2, Insightful)
Re:Audit requirements are a bitch (Score:1)
Re:Audit requirements are a bitch (Score:2)
If you need to rotate BIOS passwords every 90 days, buy PCs that allow that capability. IBM/Lenovo PCs allow remote BIOS changes and upgrades, for instance.
Re:Audit requirements are a bitch (Score:2)
If you want to exclude BIOS passwords from your policy, aren't you free to do so?
Re:Audit requirements are a bitch (Score:2)
>used to have a minimum level of complexity
Good.
>and for them to be changed every 90 days.
Stupid!
Passwords should be changed when there is some specific *reason* to change them.
-kb
Re:Audit requirements are a bitch (Score:1)
Re:Audit requirements are a bitch (Score:2)
Say some car is stolen. Does that mean every car's locks should be changed every 90-days?
A password should be changed when there is reason to believe it has been compromised. Also, passwords should never be reused across different circumstances. And they should be complex enough to not be guessable (no, "golum" is NOT a good password). But changing them every 90-days? What does that accomplish beyond making them really hard to manage, forcing people into putting them on postit no
Driver? (Score:2)
What's needed is software that limits USB... (Score:2)
What's needed is software that limits USB and other connections to those that are allowed. Such software exists, but is expensive. Here is software [newsoftwares.net] that is less expensive than packages I've seen, but the web site is so sloppy I lack confidence in it.
Re:What's needed is software that limits USB... (Score:2)
760 policies in Windows 2000, more in Windows XP (Score:2)
Sounds very possible. A Microsoft technical support representative told me that there are 760 policies in Windows 2000, more in Windows XP. So, I'm not about to look. My guess is that the Windows policies are too crude to be effective in cases where you sometimes want to use the USB port for something authorized.
Re:What's needed is software that limits USB... (Score:2)
How about a kernel compiled without USB drivers. Hmm... while we're at it probably should remove serial port drivers, parallel port driver (backpack cdrom writer uh-oh) cd writer drivers, sound card drivers (the analog hole eek!), network drivers (don't want a hole through which data could escape to another machine which DOES have USB) and probably we won't be needing video drivers, because if you have those, then the employee might look at the company secrets on
Re:What's needed is software that limits USB... (Score:1)
quite clearly "Everyone involved here realizes that there's not much we can do against a malicious employee, but we're looking to avoid accidental data loss from USB sticks, and other solid-state storage media. Has anyone on Slashdot dealt with this issue?"
Congratulations, you win the most irrelevant rant this week award, have a gold star!
Re:What's needed is software that limits USB... (Score:2)
Actually I responded to directly to his question. First, I reinforced his supposition (which he seems to be waffling on) that there's probably nothing you can do if you let people have general purpose computers. And I made the point that to attempt to try would be costly.
Then I said that if you're just worried about an employee acting negligently (i.e. not being careful) then you need to start checking people for secrets at the door, and make some examples. Suddenly you will find that
Comprehensive 5 word policy (Score:2, Funny)
Get His Head Out Of The Ground (Score:2)
Re:Get His Head Out Of The Ground (Score:3, Funny)
You're right. This is a much bigger issue than most people realize.
Every night employees leave the office with sensitive information retrieved through their monitors. The use of monitors is widespread in most offices. In fact there may be a monitor on your desk right now and you wouldn't even know it!
So while half your IT staff is frisking for USB drives, the other half should go around removing
Re:No! You're wrong! (Score:2)
No, USB is a completely different and far more difficult issue to handle.
It is not really COMPLETELY different... USB may have other uses, but on a corporate desktop you are only likely to use USB for keyboards and mice.
With floppies, tapes, CD-ROMs etc, it is easy to restrict a PC. The peripherals can either be removed completely or they can have physical locks placed on them that require a key in order to use them. The peripherals can also be disabled in the BIOS which in turn can be protected by pa
Whats the problem? (Score:2)
If thats the problem, I'd be much more concerned about where the employee is taking that data. The only reason someone would put company information on a data key is so that they could move that information to a computer somewhere outside the company network. *That's* where your security con
Re:Whats the problem? (Score:2)
Sadly, the only *real* solution to data ownership and control is DRM. The question then becomes can a DRM system be made that will allow sufficient control, but maintain the flexibility that is required for people to work within its constraints. At the same time, this snake oil must be easy to manage.
A USB thumb drive is more secure than a laptop in many ways; fewer people want to steal the thumb drive for theft of the physical object.
The trick is to find
Yeah. But DRM does *not* work (Score:2)
Treat well your employees, and *that* you have the solution to the OP problems.
Re:Yeah. But DRM does *not* work (Score:1)
Yoda is working in IT now? Better than the swamp, I guess.
I think... (Score:2)
?!
We are on the topic of data theft BY YOUR OWN EMPLOYEES. You know, Bob and Eve are the same person. Again, the disgruntled employee HAVE THE FSCKING KEY, he can access the data, or the guy in the next cubicle (that can have his computer eavesdropped, and his key discovered) has it.
If I really need lessons in crypto, state your name (as in opposition to AC) and indulge me, please.
Re:Whats the problem? (Score:2)
Most people who steal computers take them for the hardware, not the data. If they can't get into the HD to take a look around in a few minutes, they're just going to reformat it and sell it on eBay.
Also, why would encrypting the data and putting it on a thum
Re:Whats the problem? (Score:2)
Nope. The main reason they do is to avoid the network and sneakernet it around.
I've pointed people to network resources many many times...only to be told within minutes that 'Bob has the latest copy of that on his computer...ask him and he will make a copy for you'.
When Bob's computer dies...the admins should be able to restore all data.
Please explain (Score:3, Insightful)
I assume it is a concern about people copying files to the flash drives and walking out with them. But small high-capacity removable media is not anything new. When 3.5" floppy drives were common, it was trivial to take large amounts of source code, documentation, etc. Then came CDs, with more of the same. Today, DVD disks are either 3.25" or 5.25" in diameter, completely flat, and hold far more than flash drives. Yet I've never heard of anyone concerned about the security implications of DVDs. Most of my coworkers have PDAs or laptops. And every computer in the office has internet access.
So why are flash drives so magical that they deserve special treatment?
Re:Please explain (Score:1)
Re:Please explain (Score:1)
3.5" floppies don't hold much data
My office desktop doesn't have a cd/dvd burner
If someone emails out sensitive data, there is a record of it
So I guess the advantages of a flash drive are that it holds a lot of data, requires no special hardware beyond what is found on the simplest of laptops, and there is no record of information being stolen.
Is that sufficient to de
Email (Score:2)
Re:Email (Score:2)
Re:Email (Score:2)
Re:Email (Score:2)
Re:Please explain (Score:2)
As I said, we realize that there's not a damn thing we can do about malicious intent.
What the boss is concerned with is more along the lines of: "we use USB sticks for transferring data all over the place, including non-company machines (during demos, etc...). Sometimes a USB stick may be placed on a machine connected to a non-company network (e.g. a laptop). We want to avoid accidental disclosure in such cases."
Personally, I think the founder is a bit paranoid, but our company i
Re:Please explain (Score:2)
Perhaps it would be a better idea to invest in a couple of portable HDDs. That way you could run the program from the HDD and that way it's easier to ensure that you actually take it with you.
Furthermore you should (of course) establish routin
Re:Please explain (Score:2)
Make the sticks bootable, install your own OS on it so you can control the flow of data yourself. Encrypt it if you like to for extra (theft of device) security.
Re:Please explain (Score:2)
Re:Please explain (Score:1)
While this may make USB drives dangorus, it also makes them VERY helpful! The guy down the hall wants the new
Disable write access to USB devices. (Score:2)
This, coupled with good remote log hosts and alarm systems will not only prevent users from smuggling data, good or bad, it can also alert you to the activity.
This is, of course, moot if the workstations are equipped wit
Re:Disable write access to USB devices. (Score:2)
Re:Disable write access to USB devices. (Score:2)
Genius. (Score:2)
Re:Genius. (Score:2)
The topic is, (Score:2)
Can one do something to avoid it? Can one put a policy in USB drives to avoid it?
And the answer is: no. The only (somewhat) effective measures that you can take are (try to) get good people and treat your employees well, compensating them adequ
GFI LANGuard Portable Storage Contoller (Score:2)
We tried it in the demo mode when the administration at a client was freaking out about IPods. We ended up going with a written policy (that actually had enforcement!!!!!) instead of a technology solution!
over-reliance on policies and procedures (Score:2)
More and more I see companies trying to solve every problem or perceived problem by putting a policy in place. Usually, this solves the problem at the expense of morale and productivity. A once simple task is now a complicated nightmare.
It's a mistake to put a policy into place as a knee-jerk, first response. Instead, hire good people, train them well, treat them well and let them be your first defense against problems. Policies are to clarify ambiguities and apply standardization - not as a cure-all for ev
Laptops? (Score:2)
And even if all those are plugged, there is still the option of printing it out and mailing
The best solution (Score:2)
I'm just here to give you this link. [securewave.com] It's a great piece of software that works well.
You Need To Discuss More (Score:2)
Any time The Boss read an article about something new, she would ask me about it.
There are two things that really helped me:
1 - I had spent a LOT of time (with an attorney) researching and developing what I still believe were really good policies. The attorney and I both learned a lot, since I lean towards anarchy.
2 - I learned to anticipate her requests by reading tech news voraciously and keep
Re:You Need To Discuss More (Score:2)
Re:You Need To Discuss More (Score:2)
I think I left out a whole lot more than that (keep thinking: laptops, email, notebooks...)...
It was just a list to start from.
Mark
Re:You Need To Discuss More (Score:2)
Managers?
Depends upon how much you want to spend (Score:2)
On every box:
Don't forget:
USB flash drives? Bah! (Score:2)
Re:USB flash drives? Bah! (Score:2)
These two things are also much easier to smuggle out the building than a CD.
Re:USB flash drives? Bah! (Score:2)
A 2GB SD card won't fit in the work machine that is here, but the CD-RWs will fit in my R/W drive on that machine.
Heck, up until recently, I was allowed to connect my laptop to the company LAN.
this sounds like something... (Score:2)
You might need to write some custom software to monitor the backups, but it shouldnt be too hard to come up with some scripts that whip through a list of people that use USB drives and nag them to back up the data under penalty administrative punishment.
Reasons for the policy (Score:2)
Re:Reasons for the policy (Score:2)
Re:Reasons for the policy (Score:2)
OTOH you can make an argument that since a machine has services available to the public, e.g. a web server, the "Oh gosh, I didn't realize I wasn't supposed to dump the hash file, crack all the passwords, and turn the box into a warez dump" argument may stand up. But by explicitly denying "unauthorized use", you've got a slightly better case.
No, a banner won't help much. But it's there, and since common sense do
Encryption? (Score:1)
This won't protect against a malicious employee or a determined attacker, but should fix th
Why are they using flash drives? (Score:2)
don't allow them (Score:2)
You'll maybe need to treat laptops differently, but those are a problem anyway, because they get stolen all the time. I haven't figured out how to handle those properly.
You don't have to ban the thumb drives... (Score:1)
Reduce need for removeable media (Score:2)
The most common reason I hear for why we just HAVE to give so many people, e.g., CD-burners is "they need to take data home to work on it..."
I keep wondering - wouldn't it be simpler to set up a "Windows Terminal Server" and have remote employees use THAT instead? That way, the only data leaving the company are (presumably encrypted) screen updates and key presses (yes, you CAN transfer files directly through the same mechanism, but how often would you legitimately need to if you can operate your "officia
Re:Reduce need for removeable media (Score:2)
you CAN transfer files directly through the same mechanism [RDP]
You can also disable file transferes, clipboard copieing, and the other redirected services. It won't stop a dedicated attacker, but few things will.
Log Everything. Tell them. Enforce the rules. (Score:2)
You might....
Figure out how to log all USB plug-in/remove events and notify a central location when they are USB Mass Storage devices. Figure out how to log all copies or transfers to/from USB mass storage devices. Make up some reporting process and either have a talk with excessive USB-keyers or disable their USB ports. Remember that they can probably use other workstations to do as they please. Could USB Mass Storage devices be mad
Go with thin clients with no USB ports (Score:2)
Cheap solution (Score:2)
We have disabled them. (Score:1)
HKEY_LOCAL_MACHINE\
SYSTEM\
CurrentControlSet\
Services\
UsbStor = 4 (from 3)
to disable USB mass storage support. To disable CD burning:
HKEY_CURRENT_USER\
Software\
Microsoft\
Windows\
CurrentVersion\
Policies\
Explorer\
NoCDBurning=dword:00000001
Just make sure your users don't
If I were in your shoes... (Score:2)
Obtain a large number of memory sticks branded distinctively with the company's logo/colours. Hand these out freely to employees. Make replacements easily obtainable on request subject to a record of issue being made.
Only company-branded memory sticks can be used in company-owned machines. Using non-company-owned sticks in company-owned machines is considered a disciplinary offence.
Company-owned sticks that are inserted into non-company owned machines must be con
Heh. (Score:1)
Re:Whats the dealio? (Score:2)
Where I work there are similar no removable storage (including floppy) policies for people dealing with sensitive information.
who accessed it... (Score:2)
Re:Rather draconian, but ... (Score:2)
If not, my guess is that users see the rule as the kind of stupid, inconsistent and obstructionist policy it is, and therefore decide not to obey.
Rules need to be seen as fair and reasonable if they're going to be obeyed.
Re:Rather draconian, but ... (Score:3, Insightful)
Re:Rather draconian, but ... (Score:2)
If the issue is keeping track of files as the original post implied, then the answer is one of training. Don't store anything long-term on removable media such as floppy drives or flash drives. (I'm ignoring backup solutions such as tape drives fo rthe moment.) Use flash drives as a convenienc
Re:windows AD domain policy (Score:1)
I just wanted to point out that most malicious software can be installed without the user having administrative rights. such software often exploits vulnerabilities in windows or IE to get the installation to run as a system process instead of using the rights assigned to the user.
Re:windows AD domain policy (Score:2)
Of course they'll have to log out eventually. It's Windows. I can never keep my workstation at work logged in without reboot for more than a week.