10.3
IG1 IG2 IG3

Disable Autorun and Autoplay for Removable Media

Control Group: 10. Malware Defenses
Asset Type: Devices
Security Function: Protect

Description

Disable autorun and autoplay auto-execute functionality for removable media.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

USB-Based Malware Auto-Execution

Integrity

Malware-laden USB devices automatically execute malicious payloads when inserted into systems with autorun enabled, a technique used in targeted attacks (Stuxnet-style) and opportunistic campaigns where infected USB drives are distributed in public areas.

Removable Media Worm Propagation

Availability

Self-propagating worms spread across the enterprise via removable media by leveraging autorun functionality to copy themselves to every USB device inserted, then executing automatically on each new system the device connects to.

Social Engineering via Dropped USB Devices

Confidentiality

Attackers deliberately leave infected USB drives in parking lots, lobbies, or conference rooms, and autorun functionality causes malicious payloads to execute immediately when curious employees insert the devices into their workstations.

Vulnerabilities (When Safeguard Absent)

Autorun and Autoplay Enabled on Enterprise Assets

Windows autorun and autoplay features remain enabled at default settings, allowing removable media to automatically execute programs, scripts, or installers without requiring explicit user action beyond inserting the device.

No Group Policy Enforcement Disabling Auto-Execute

Group policies or configuration management tools have not been configured to disable autorun and autoplay across all enterprise assets, leaving systems vulnerable to automatic execution of removable media content.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually