STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Red Hat Enterprise Linux 10 Security Technical Implementation Guide

V-281288

CAT II (Medium)

RHEL 10 must be configured to disable USB mass storage.

Rule ID

SV-281288r1166816_rule

STIG

Red Hat Enterprise Linux 10 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-000778CCI-001958

Discussion

USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163

Check Content

Verify RHEL 10 disables the ability to load the USB Storage kernel module with the following command:

$ sudo grep -rs usb-storage /etc/modprobe.conf /etc/modprobe.d/*
/etc/modprobe.d/usb-storage.conf:install usb-storage /bin/false
/etc/modprobe.d/usb-storage.conf:blacklist usb-storage

If the command does not return any output, or either line is commented out, and use of USB Storage is not documented with the information system security officer as an operational requirement, this is a finding.

Fix Text

Configure RHEL 10 to prevent the usb-storage kernel module from being loaded.

Add the following lines to the file "/etc/modprobe.d/usb-storage.conf" (or create "usb-storage.conf" if it does not exist):

$ sudo vi /etc/modprobe.d/usb-storage.conf

install usb-storage /bin/false
blacklist usb-storage