USB Control is the combination of policies, technical restrictions and monitoring
mechanisms that determine how, when and which USB devices may be used on systems. The
goal is to prevent Malware, data
leaks and unauthorised access via USB.
In OT environments, USB is often still an essential
channel for Firmware updates, data
logging or maintenance. That makes it a critical risk factor.
⚠️ Why is USB risky in OT?
Risk
Example in an industrial context
Malware via USB
A USB stick with a Stuxnet variant infects a PLC or HMI
Shadow IT / unauthorised tools
An engineer uses unsanctioned analysis or backup tools
Data leakage
Logs or recipes copied to an external drive
Firmware tampering
Sabotaged firmware on a stick appears legitimate
BadUSB attack
A USB device behaves as a keyboard and executes commands
🧠 What falls under USB Control?
Control measure
Description
USB port disabling
Disabling ports physically or via software
Device whitelisting
Only specific devices are allowed (based on VID/PID/serial number)
USB Control is essential in OT environments
where air gaps exist but USB still grants access to critical systems.
Technology, policy and awareness must work together to prevent misuse or mistakes.