STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269382

CAT II (Medium)

AlmaLinux OS 9 must block unauthorized peripherals before establishing a connection.

Rule ID

SV-269382r1050265_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-001958

Discussion

The USBGuard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the usbguard-rules.conf file. The policy and the authorization state of USB devices can be modified during runtime using the USBGuard tool. The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices.

Check Content

Note: If the system is virtual machine with no virtual or physical USB peripherals attached, this is not a finding.

Verify the USBGuard has a policy configured with the following command:

$ usbguard list-rules

1: allow id 1d6b:0002 serial "0000:03:00.0" name "xHCI Host Controller" with-interface 09:00:00 with-connect-type ""
2: allow id 1d6b:0003 serial "0000:03:00.0" name "xHCI Host Controller" with-interface 09:00:00 with-connect-type ""
3: allow id 0627:0001 serial "28754-0000:00:02.2:00.0-1" name "QEMU USB Tablet" with-interface 03:00:00 with-connect-type "unknown"

If the command does not return results or an error is returned, ask the SA to indicate how unauthorized peripherals are being blocked.

If there is no evidence that unauthorized peripherals are being blocked before establishing a connection, this is a finding.

Fix Text

Configure the operating system to enable the blocking of unauthorized peripherals with the following command:

Note: This command will create an allow list for any USB devices currently connect to the system.

$ usbguard generate-policy --no-hashes | tee /etc/usbguard/rules.conf

Note: Enabling and starting USBGuard without properly configuring it for an individual system will immediately prevent any access over a USB device such as a keyboard or mouse.