Skip to Content

A NIST-Aligned Solution for Secure USB and SD Card Access

Removable Media Security Without Breaking How People Work
December 30, 2025 by
Justin Bisted

Secure Removable Media Without Breaking How People Actually Work


A NIST-Aligned USB Security Solution Built on Raspberry Pi


The Problem Nobody Likes to Admit

When a USB device plugs directly into a workstation, control is gone instantly.

It is not just about infected files anymore.

Some of the most dangerous USB threats today:

  • Pretend to be keyboards

  • Type commands faster than a human can react

  • Never store a file

  • Never trigger antivirus

A cable can do it.

A “keyboard” can do it.

A device that looks like storage can do it.

Once that device touches a Windows system directly, the damage can already be done.

And users cannot tell the difference. That is not a training failure. That is physics.

Why “Just Disable USB” Fails in the Real World

On paper, disabling USB ports sounds decisive.

In reality, it pushes the problem underground.

When USB is blocked completely:

  • Files get emailed to personal accounts

  • Shadow cloud storage appears

  • One “exception computer” becomes the riskiest machine in the building

  • IT spends time approving workarounds instead of managing risk

The work does not stop. It just becomes invisible.

Security that forces people to sneak around it is not security.

The Idea That Finally Clicked

Instead of trusting endpoints to handle removable media safely, this design removes removable media from endpoints entirely.

USB devices never touch workstations.

Not storage.

Not keyboards.

Not composite devices.

There is one safe lane in. One safe lane out.

And that lane is isolated.

The Raspberry Pi Media Gateway

The solution is built on dedicated Raspberry Pi stations, intentionally designed to do one thing only: safely handle removable media.

Each Pi acts as a media airlock.

  • USB drives and SD cards are connected to the Pi, not the workstation

  • Files are transferred through a controlled process

  • Executables are blocked

  • Nothing runs

  • Nothing types

  • Everything is logged

  • System is in a read only state

  • All config files are checked for modification "SHA HASH"

  • Simple Accountability by using SSH keys

The workstation never sees the device. It only receives approved files.

That single architectural decision eliminates entire classes of attack.

How This Stops the Attacks People Do Not See Coming

Keyboard Injection and Malicious Cables

Devices that impersonate keyboards rely on trust. If a workstation never accepts USB devices, there is nothing to trust. (Zero Trust)

No keystrokes. No commands. No silent compromise.

Composite USB Devices

Devices that pretend to be multiple things at once are neutralized. The Pi handles storage only and ignores unexpected behavior.

Human Error Under Pressure

There is no chance to double-click the wrong thing. Files move. They do not execute.

Security is enforced by design, not by hoping someone remembers a rule at the worst possible moment.

What This Replaces

This approach replaces:

  • The “scan it on a Windows PC first” computer

  • The dusty air-gapped laptop nobody patches

  • An IT department that "Get's around to it"

  • Endless USB exceptions in endpoint policies

  • Training that asks users to identify invisible threats

  • Expensive kiosk solutions that are overkill for many environments

It replaces all of that with one predictable, boring workflow.

Boring is good.

Aligned With NIST, Designed for Humans

The architecture aligns with guidance from National Institute of Standards and Technology, particularly around controlled media use, least functionality, audit logging, and system integrity.

But alignment was not the goal. Effectiveness was.

This is what NIST guidance looks like when it is translated into something people can actually live with.

Accountability Without Drama

Every interaction with a Pi station is logged:

  • Who used it

  • When media was connected

  • What files moved

Logs are retained and monitored independently, creating a clean audit trail without slowing anyone down.

When questions come up later, answers exist.

Why People Accept This So Quickly

Because it feels fair.

  • Users are not blamed

  • Workflows are clear

  • Security makes sense

  • Nobody has to ask for special permission

  • SIMPLE, FAST, EASY, BORING

People stop fighting the controls because the controls finally respect reality.

The Outcome

  • USB-based hardware attacks eliminated by design

  • Malware delivery paths removed, not monitored

  • Workstations stay locked down

  • The organization still functions

This is not about fear.

It is about clarity.

Once people see how these attacks actually work, they stop asking “why do we need this” and start asking “where is the station.”

That is the moment security starts working.

Develop Better Computer Security Habits