https://www.nsa.gov/Resources/Media-Destruction-Guidance/
NSA's Center for Storage Device Sanitization Research (CSDSR) guides the sanitization of information system (IS) storage devices. Resources for a vendor of storage device sanitization, the NSA Evaluated Products Lists (EPLs), and contact information for the Center for Storage Device Sanitization Research are provided on this page.
https://www.opswat.com/blog/removable-media-policy-guidelines-best-practices
Implementing a removable media policy helps organizations control how employees use USB drives, external hard drives, and other portable storage devices. The main purpose is to prevent data breaches and malware infections while keeping sensitive company information secure. These policies set clear rules about what's allowed and what isn't, helping businesses stay compliant with important security standards like ISO 27001, NIST, and Department of Defense requirements.
https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/7/html/security_guide/sec-using-usbguard
The USBGuard software framework provides system protection against intrusive USB devices by implementing basic whitelisting and blacklisting capabilities based on device attributes.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/bltea59236f183ab31b/5e9e06135352ae292603886c/removable_media_policy.pdf
This sample policy provided by SANS discusses removable media.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt923fb32fd86a4b9f/5e9dd76dc81c45292c0d4f78/technology_equipment_disposal_policy.pdf
This is a equipment disposal policy created by SANS that can be freely used.
https://uit.stanford.edu/security/data-sanitization
This is Stanford University’s policy for data sanitization.
https://pamms.dhs.ga.gov/oit/1916-system-maintenance-policy/
This example policy from the State of Georgia provides a starting point for system maintenance.
https://www.cisa.gov/sites/default/files/publications/RisksOfPortableDevices.pdf
This paper focuses on the risks associated with simple media devices and smart media devices.
Western University – Current Recommended Practices for Destroying Data and/or Data Devices
3.7 3.7.3 3.8 3.8.3 Maintenance Media Protection
https://cybersmart.uwo.ca/for_it_support_providers/procedures_resources/procedures/disposal_guidelines_and_best_practices.html
This is Western University’s recommended practices for destroying data and/or data devices.
YouTube – CMMC 2.0 Control MA L2-3.7.2 – Provide controls on the tools, techniques, mechanisms, and personnel
3.7 3.7.1 3.7.2 Maintenance
https://www.youtube.com/watch?v=JVookLZAqCk
In this video, Mike breaks down CMMC 2.0 Control MA L2-3.7.2. You need written procedures, you need documentation on your process for allowing access to your systems, you are going to have to justify every step of how you run your system on paper through written procedure and that includes your IT team and who gets access to what and how they get that access.