STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Oracle Linux 8 Security Technical Implementation Guide

V-248837

CAT II (Medium)

OL 8 must be configured to disable the ability to use USB mass storage devices.

Rule ID

SV-248837r986386_rule

STIG

Oracle Linux 8 Security Technical Implementation Guide

Version

V2R8

CCIs

CCI-000778CCI-003959

Discussion

USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity.

Check Content

Verify the operating system disables the ability to load the USB Storage kernel module.

     $ sudo grep -r usb-storage /etc/modprobe.d/* | grep -i "/bin/false"
     install usb-storage /bin/false

If the command does not return any output, or the line is commented out, and use of USB Storage is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding.

Determine if USB mass storage is disabled with the following command: 
 
     $ sudo grep usb-storage /etc/modprobe.d/* | grep -i "blacklist" | grep -v "^#" 
     /etc/modprobe.d/blacklist.conf:blacklist usb-storage 
 
If the command does not return any output or the output is not "blacklist usb-storage" and use of USB storage devices is not documented with the ISSO as an operational requirement, this is a finding.

Fix Text

Configure OL 8 to disable the ability to use the USB Storage kernel module and to use USB mass storage devices.

     $ sudo vi /etc/modprobe.d/blacklist.conf

Add or update the lines: 

     install usb-storage /bin/false
     blacklist usb-storage

Reboot the system for the settings to take effect.