UCF STIG Viewer Logo



Number Title Impact Priority Subject Area
MP-4 Media Storage MODERATE P1 Media Protection

The organization:
Physically controls and securely stores Assignment: organization-defined types of digital and/or non-digital media within Assignment: organization-defined controlled areas; and
Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
Information system media includes both digital and non-digital media. Digital media includes, for example, diskettes, magnetic tapes, external/removable hard disk drives, flash drives, compact disks, and digital video disks. Non-digital media includes, for example, paper and microfilm. Physically controlling information system media includes, for example, conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the media library, and maintaining accountability for all stored media. Secure storage includes, for example, a locked drawer, desk, or cabinet, or a controlled media library. The type of media storage is commensurate with the security category and/or classification of the information residing on the media. Controlled areas are areas for which organizations provide sufficient physical and procedural safeguards to meet the requirements established for protecting information and/or information systems. For media containing information determined by organizations to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on organizations or individuals if accessed by other than authorized personnel, fewer safeguards may be needed. In these situations, physical access controls provide adequate protection.

MP-4 (1) Cryptographic Protection

Withdrawn: Incorporated into SC-28 (1).

MP-4 (2) Automated Restricted Access
Automated mechanisms can include, for example, keypads on the external entries to media storage areas.

The organization employs automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted.