STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

V-282594

CAT II (Medium)

TOSS 5 must have the USBGuard package enabled.

Rule ID

SV-282594r1200762_rule

STIG

Tri-Lab Operating System Stack (TOSS) 5 Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001958CCI-003959

Discussion

The USBguard-daemon is the main component of the USBGuard software framework. It runs as a service in the background and enforces the USB device authorization policy for all USB devices. The policy is defined by a set of rules using a rule language described in the usbguard-rules.conf file. The policy and the authorization state of USB devices can be modified during runtime using the usbguard tool. The system administrator (SA) must work with the site information system security officer (ISSO) to determine a list of authorized peripherals and establish rules within the USBGuard software framework to allow only authorized devices. Satisfies: SRG-OS-000378-GPOS-00163, SRG-OS-000690-GPOS-00140

Check Content

Verify TOSS 5 has USBGuard enabled using the following command:

$ systemctl is-active usbguard

active

If usbguard is not active, ask the SA to indicate how unauthorized peripherals are blocked.

If there is no evidence that unauthorized peripherals are being blocked before establishing a connection, this is a finding.

Fix Text

Enable the USBGuard service using the following command:

$ sudo systemctl enable --now usbguard