3.8 — Media Protection

Media Protection (MP) Policy

Establishes requirements for protecting, sanitizing, and controlling system media containing CUI — covering 9 controls per NIST SP 800-171 Rev 2.

Family: 3.8 — MPControls: 9Owner: Kit E. Floyd, Jr.Last Review: April 3, 2026
SELF-ASSESSMENT

Control statuses below reflect an internal self-assessment prepared with AI assistance. Statuses marked "Implemented" may be organizational claims without verifiable evidence. See POA&M for known gaps.

Policy Statement

OCSI shall protect, limit access to, sanitize, and control the transport of media containing CUI. Digital and non-digital media shall be marked, tracked, and destroyed in accordance with NIST guidelines.

Control Implementation
ControlRequirementImplementationStatus
3.8.1Protect (i.e., physically control and securely store) system media containing CUI, both paper and digitalDigital CUI stored in browser localStorage on authorized devices only. No server-side CUI storage. Physical media policy requires locked storage for any printed CUI. Authorized devices tracked in asset inventory. Implemented
3.8.2Limit access to CUI on system media to authorized usersCommand Center requires authentication (SHA-256 verified credentials) for access to CUI data. localStorage data isolated per browser origin. No public access to CUI-containing pages. Implemented
3.8.3Sanitize or destroy system media containing CUI before disposal or release for reuseDevice disposal policy: browser localStorage cleared (localStorage.clear()) and browser history purged. Physical media shredded using cross-cut shredder. external MSSP consulted for digital media sanitization verification. Implemented
3.8.4Mark media with necessary CUI markings and distribution limitationsAll security protocol documents marked with CUI banner. Exported data files tagged with "CUI" header. Command Center export function includes CUI marking in output files. Implemented
3.8.5Control access to media containing CUI and maintain accountability for media during transport outside of controlled areasAll data transport occurs via encrypted FTP channel. No portable media (USB, CD) authorized for CUI transport. Cloud backup requires encrypted transfer. Transport logs maintained. Implemented
3.8.6Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital mediaNOT IMPLEMENTED. CUI in localStorage is stored as plaintext JSON — no encryption at rest. Browser same-origin policy is NOT encryption. HTTPS protects data in transit only. Device-level encryption depends on user configuration (not enforced by OCSI). Not Implemented
3.8.7Control the use of removable media on system componentsOrganizational policy: removable media (USB drives, external storage) not authorized for CUI. All data transfer performed via encrypted network connections only. Implemented
3.8.8Prohibit the use of portable storage devices when such devices have no identifiable ownerPolicy prohibits use of any unidentified portable storage. All authorized devices registered in asset inventory with owner assignment. Implemented
3.8.9Protect the confidentiality of backup CUI at storage locationsNOT VERIFIED. Command Center data export produces JSON files. However, backup procedures have not been documented or tested. No evidence that backups are stored on encrypted devices. No backup schedule exists. Not Verified
Media Types & Controls
Media TypeAuthorizedCUI StorageDisposal Method
Browser localStorageYes (authorized devices)PermittedlocalStorage.clear() + browser purge
Printed documentsLimitedPermitted (marked)Cross-cut shredding
USB/removable mediaNoProhibitedN/A
Cloud storageNo (future consideration)Not applicableN/A
Review Schedule: Media protection policy reviewed semi-annually. Media inventory audited quarterly.