MP-04 Media Storage

Media Protection

Low Moderate High

Description

The organization physically controls and securely stores information system media within controlled areas.

Supplemental Guidance

Information system media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). A controlled area is any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information and/or information system. This control applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones). Telephone systems are also considered information systems and may have the capability to store information on internal media (e.g., on voicemail systems). Since telephone systems do not have, in most cases, the identification, authentication, and access control mechanisms typically employed in other information systems, organizational personnel exercise extreme caution in the types of information stored on telephone voicemail systems. An organizational assessment of risk guides the selection of media and associated information contained on that media requiring physical protection. Organizations document in policy and procedures, the media requiring physical protection and the specific measures taken to afford such protection. The rigor with which this control is applied is commensurate with the FIPS 199 security categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these situations, it is assumed that the physical access controls to the facility where the media resides provide adequate protection. The organization protects information system media identified by the organization until the media are destroyed or sanitized using approved equipment, techniques, and procedures. As part of a defense-in-depth protection strategy, the organization considers routinely encrypting information at rest on selected secondary storage devices. FIPS 199 security categorization guides the selection of appropriate candidates for secondary storage encryption. The organization implements effective cryptographic key management in support of secondary storage encryption and provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by users. NIST Special Publications 800-56 and 800-57 provide guidance on cryptographic key establishment and cryptographic key management. Related security controls: CP-09, RA-02.

Enhancements

(0) None.

Compliance Mappings

ISO 27001:2022

A.7.10A.7.7

ISO 27002:2022

7.107.7

COBIT 2019

APO14BAI09

CIS Controls v8

CIS 3CIS 3.9

NIST CSF 2.0

PR.DS-01

PCI DSS v4.0.1

9.4

CSA CCM v4

DCS-05

CSA AICM v1

DCS-05

FINOS CCC

CCC-C16

ISO 42001:2023

A.4.3

PRA Operational Resilience

SS2/21-11.1

MAS TRM

11

ANSSI

Hygiene.19Hygiene.37SecNumCloud.12.1SecNumCloud.9.2

FINMA Circular 2023/1

IV.D(78)IV.D(81)IV.D(82)

OSFI B-13

B-13.3.2

EU GDPR

Art.32(1)(a)Art.5(1)(f)

EU DORA

Art.9(4)(a)Art.9(4)(b)

BIO2

7.107.7

RBI CSF

Annex1.12Annex1.15

FISC Security Guidelines

FISC.F4

LGPD + BCB 4893

LGPD.Art.46

HKMA TM-E-1

TME1.6.5TME1.7.2TME1.9.2

MLPS 2.0

8.1.10.1

DNB Good Practice

DNB.11.3DNB.12.1DNB.12.3DNB.2.2

EU CRA

CRA.I.2e

SWIFT CSCF

SWIFT.3.1

SAMA CSF

3.9

NCA ECC

2-62-72-9

UAE IA

T4

CBB TM

TM-9

Qatar NIA

AM

CBUAE

CR-5

CBE CSF

CTO-2

SA JS2

JS2-8.2

CBN CSF

Part3.4

BoG CISD

CISD-V

POPIA

s19

BCBS 239

Principle 11

CPMI-IOSCO PFMI

CG.PR

FFIEC IS

II.C.13II.C.13(a)II.C.5

NYDFS 500

500.15

HIPAA Security Rule

§164.308(a)(7)(ii)(A)§164.310(d)(1)§164.310(d)(2)(iii)§164.310(d)(2)(iv)

ECB CROE

CROE.2.3.3

SEBI CSCRF

PR.DS

BOT Cyber Resilience

Ch2.3

CMMC 2.0

MP

NERC CIP

CIP-011-3

10 CFR 73.54

RG5.71-B-MA

API 1164

Sec 8

CBEST

CBEST.9

PCI HSM

5

Solvency II

DR.266-DataSec

Lloyd's Minimum Standards

MS8.7

NAIC Insurance Data Security

4-encryption4B

HITRUST CSF v11

07.b09.d09.f

FDA 21 CFR Part 11

§11.10(c)

FDA Cybersecurity Guidance

SA-4

ISO 27799

12.3

NHS DSPT

NDG-1.1

MiCA

Art.40(1)Art.55(1)Art.63(1)Art.97(1)

Basel SCO60

SCO60.61SCO60.63

BSSC Standards

NOS-08TIS-07KMS-03KMS-05KMS-09KMS-10

SEC Custody (Digital Assets)

SEC-CD-04SEC-CD-06SEC-CD-16

ISO 17799 (legacy)

10.7.110.7.210.7.310.7.415.1.3

COBIT 4.1 (legacy)

DS11.2DS11.6