Tektronix USB Tx and Rx software solutions meet the electrical validation, compliance, characterization and debug needs of engineers designing USB 3.1 Type-C, USB 3.1, and USB 2.0 based systems, which are compliant to the USB-IF test standards. A solution for USB-PD electrical parametric and protocol measurements for compliance is also available. The USB design is standardized by the USB Implementers Forum (USBIF) that is comprised of a group of companies supporting and promoting the USB. The USBIF not only markets the USB but maintains the specifications and upholds the compliance program. Specifications for the USB were created in 2005 with the 2.0 version.
Usb Compliance Network & Wireless Cards Drivers
Findings (MAC III - Administrative Sensitive)
Usb Compliance Network & Wireless Cards Drivers
Finding ID | Severity | Title | Description |
---|---|---|---|
V-22110 | High | Require approval prior to allowing use of portable storage devices. | Use of unapproved devices to process non-publicly releasable data increases the risk to the network. Devices attached to or inserted into the end point's plug-and-play ports and slots can be a ... |
V-22115 | High | Set boot order of computers approved for use with removable storage such that the Basic Input Output System (BIOS) does not allow default booting from devices attached to a USB, firewire, or eSATA port. | If the BIOS is left set to allow the end point to boot from a device attached to the USB, firewire, or eSATA port, an attacker could use a USB device to force a reboot by either performing a ... |
V-22173 | High | Permit only government-procured and -owned devices. | Persistent memory devices (e.g., thumb drives, memory cards, external hard drives, or other removable storage devices) may contain malware installed on the drive or within the firmware. ... |
V-22111 | High | Access to mobile and removable storage devices such as USB thumb drives and external hard disk drives will be protected by password, PIN, or passphrase. | If USB media and devices are not protected by strong access control techniques, unauthorized access may put sensitive data at risk. requires that remote and mobiledrives be encrypted using FIPS ... |
V-23894 | Low | Maintain a list of all personnel that have been authorized to use flash media. | Many USB flash media devices are portable, easily stolen, and may be used to temporarily store sensitive information. If these devices are lost or stolen, it will assist the investigation if ... |
V-23895 | Low | Maintain a list of all end point systems that have been authorized for use with flash media. | Many USB persistent memory devices are portable and easily overlooked. They may be used as a vector for exfiltrating data. To help mitigate this risk, end points must be designated as properly ... |
V-24176 | Low | Configure the cryptographic module on a USB thumb drive or external hard drive using a NIST-approved encryption algorithm to encrypt sensitive or restricted data-at-rest. | The DoD DAR policy requires encryption for portable and mobile storage. However, even when a FIPS140-2 validated cryptographic module is used, the implementation must be configured to use a ... |
- 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com.
- A USB device, regardless if it’s a storage device or a mic, will work with no trouble. If your USB is not detected, there are a few things you can try. First and foremost, run a hardware check. Change the port that you connect the USB to. If you’re using a USB hub, remove it and try connecting the USB directly to your system.