STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

V-269357

CAT II (Medium)

AlmaLinux OS 9 must be configured to disable USB mass storage.

Rule ID

SV-269357r1050240_rule

STIG

Cloud Linux AlmaLinux OS 9 Security Technical Implementation Guide

Version

V1R6

CCIs

CCI-000381CCI-001958CCI-000778CCI-003959

Discussion

USB mass storage permits easy introduction of unknown devices, thereby facilitating malicious activity. Satisfies: SRG-OS-000095-GPOS-00049, SRG-OS-000378-GPOS-00163, SRG-OS-000114-GPOS-00059, SRG-OS-000690-GPOS-00140

Check Content

Verify that AlmaLinux OS 9 disables the ability to load the USB Storage kernel module with the following command:

$ grep -r usb-storage /etc/modprobe.conf /etc/modprobe.d/* 

/etc/modprobe.d/usb-storage.conf:install usb-storage /bin/false
/etc/modprobe.d/usb-storage.conf:blacklist usb-storage

If the command does not return any output, or the line is commented out, and use of usb-storage is not documented with the information system security officer (ISSO) as an operational requirement, this is a finding.

Fix Text

To configure the system to prevent the usb-storage kernel module from being loaded, run the following command:

$ cat << EOF | tee /etc/modprobe.d/usb-storage.conf 
install usb-storage /bin/false
blacklist usb-storage
EOF