A virtual essential must not have connected devices that are not necessary for its operation (e.g., Floppy, IDE, CD/DVD, USB, Serial).
This control refers to the restriction of access and permissions to the minimum necessary functions for the operation of the system. In the context of virtual essentials, unnecessary connected devices increase the attack surface, providing potential ways for exploitation.
Actions as the use of malicious USB devices, BadUSBs, unauthorized data exfiltration, among others, can be executed against virtual essentials and eventually gaining access to the host system.
This requirement is verified in following services
Plan | Supported |
---|---|
Essential | 🔴 |
Advanced | 🟢 |