MP-02 Media Access

Media Protection

Low Moderate High

Description

The organization restricts access to information system media to authorized individuals.

Supplemental Guidance

Information system media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). This control also applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones). An organizational assessment of risk guides the selection of media and associated information contained on that media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures taken to restrict access. The rigor with which this control is applied is commensurate with the FIPS 199 security categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these situations, it is assumed that the physical access controls where the media resides provide adequate protection.

Compliance Mappings

ISO 27001:2022

A.7.10

ISO 27002:2022

7.10

COBIT 2019

APO14BAI09

CIS Controls v8

CIS 3

SOC 2 TSC

C1.1

PCI DSS v4.0.1

9.4

CSA CCM v4

HRS-03

CSA AICM v1

HRS-03

FINOS CCC

CCC-C16

ISO 42001:2023

A.4.3

MAS TRM

11

ANSSI

Hygiene.14Hygiene.19SecNumCloud.9.2

FINMA Circular 2023/1

IV.B.d(59)IV.D(78)IV.D(80)

OSFI B-13

B-13.3.2

EU GDPR

Art.32(1)(b)Art.5(1)(f)

EU DORA

Art.9(4)(b)

BIO2

7.10

RBI CSF

Annex1.12

FISC Security Guidelines

FISC.F4FISC.T5

LGPD + BCB 4893

LGPD.Art.46

HKMA TM-E-1

TME1.7.2

MLPS 2.0

8.1.10.1

DNB Good Practice

DNB.12.1

SWIFT CSCF

SWIFT.3.1

SAMA CSF

3.9

NCA ECC

2-7

UAE IA

T4

CBB TM

TM-9

Qatar NIA

AM

CBUAE

CR-5

CBE CSF

CTO-2

SA JS2

JS2-6.1JS2-8.2

CBN CSF

Part3.4

BoG CISD

CISD-V

POPIA

s19

BCBS 239

Principle 11

CPMI-IOSCO PFMI

CG.PR

FFIEC IS

II.C.13II.C.13(a)

HIPAA Security Rule

§164.310(c)§164.310(d)(1)

ECB CROE

CROE.2.2.2CROE.2.3.3

SEBI CSCRF

PR.DS

BOT Cyber Resilience

Ch2.3

CMMC 2.0

MP

NERC CIP

CIP-011-3

10 CFR 73.54

RG5.71-B-MA

API 1164

Sec 8

Solvency II

DR.266-DataSec

Lloyd's Minimum Standards

MS8.7

NAIC Insurance Data Security

4B

HITRUST CSF v11

07.b09.f

FDA Cybersecurity Guidance

SA-4

NHS DSPT

NDG-1.1

MiCA

Art.40(1)Art.55(1)Art.63(1)Art.97(1)

Basel SCO60

SCO60.61

ISO 17799 (legacy)

10.7.3

COBIT 4.1 (legacy)

DS11.6