USB Security for Manufacturing and OT/ICS Environments

April 5, 2026 · 13 min read · PortGuard Team

Stuxnet changed everything. The worm that destroyed Iranian uranium centrifuges in 2010 didn't arrive over the internet — it crossed an air gap on a USB drive. Fifteen years later, USB devices remain the primary attack vector for industrial control systems, and the threat has only grown more sophisticated. CISA's ICS-CERT has tracked a steady increase in USB-borne malware targeting manufacturing environments, including campaigns like EKANS/Snake ransomware and PIPEDREAM/Incontroller that specifically target industrial protocols.

Yet most manufacturing organizations still treat USB security as an IT problem, applying office-style Group Policy restrictions that don't account for the realities of operational technology. The result is either policies so strict they halt production, or policies so loose they leave critical infrastructure exposed. This guide covers how to build USB security controls that actually work in manufacturing and OT/ICS environments — protecting production systems without stopping production.

Why Manufacturing and OT Are Different

USB security in a manufacturing environment is fundamentally different from a corporate office. Controls designed for knowledge workers at desks don't translate to plant floors, control rooms, and field operations:

The USB Threat Landscape for Industrial Environments

Understanding the specific threats helps you prioritize controls. USB-borne attacks on manufacturing fall into distinct categories:

Threat How It Works Real-World Example Impact
Worm propagation Self-replicating malware spreads via autorun or exploit when USB is inserted Stuxnet crossed air gaps via USB, targeting Siemens S7-300 PLCs Physical destruction of equipment, production halt
Ransomware delivery Encrypted payload delivered via USB to systems with no email/web vector EKANS ransomware targeted Honda and Enel, killing ICS-specific processes Full production shutdown, ransom payment, recovery costs
Data exfiltration Insider copies proprietary recipes, PLC programs, or production data to USB Multiple cases of departing engineers copying PLC ladder logic and SCADA configs IP theft, competitive advantage loss
HID spoofing Device appears as keyboard, injects commands into HMI or engineering workstation Rubber Ducky and O.MG cables used in physical penetration tests of plants Unauthorized configuration changes, safety system manipulation
Supply chain compromise Vendor-provided USB with firmware updates contains embedded malware Compromised vendor update USB distributed to water treatment facilities Persistent backdoor in control systems
The Honeywell USB Threat Report consistently finds that over 50% of USB-borne threats targeting industrial environments are specifically designed to cross air gaps, and nearly 80% could cause disruption to OT systems. These aren't opportunistic office malware — they're purpose-built for industrial targets.

Compliance Frameworks That Require USB Controls

If your manufacturing operation falls under any of these frameworks, USB device control isn't optional:

IEC 62443 (Industrial Automation and Control Systems Security)

The primary international standard for ICS security. Several requirements directly address removable media:

NIST SP 800-82 (Guide to ICS Security)

The U.S. government reference for industrial control system security. Section 6.2.6 specifically addresses portable devices and removable media, recommending:

NERC CIP (Critical Infrastructure Protection)

Mandatory for electric utilities. CIP-010-4 requires documented processes for managing removable media, including malware scanning before use on BES (Bulk Electric System) Cyber Systems. CIP-007-6 R3 requires malicious code prevention, including controls for USB-introduced malware.

FDA 21 CFR Part 11 (Pharmaceutical Manufacturing)

Requires controls on electronic records and signatures. USB devices that can introduce unauthorized changes to manufacturing execution systems or quality records must be controlled and audited.

6 USB Security Controls for OT Environments

1. Zone-Based USB Policies Using the Purdue Model

Don't apply one USB policy to your entire organization. Map your USB controls to the Purdue Reference Model levels, applying stricter controls as you move closer to physical processes:

Purdue Level Systems USB Policy
Level 0–1 (Process) PLCs, RTUs, sensors, actuators No USB access. Physical port locks on all USB interfaces. Any maintenance requiring USB uses a dedicated, scanned device with a documented change ticket.
Level 2 (Control) HMIs, SCADA servers, engineering workstations Default-deny with strict whitelist. Only IT-issued, scanned devices allowed. All connections logged. Engineering workstations allow approved vendor devices by serial number.
Level 3 (Operations) Historian, MES, batch management Default-deny with operational whitelist. Data export restricted to approved encrypted drives. Read-only mode for incoming data transfers.
Level 3.5 (DMZ) Data diodes, jump servers, patch servers USB allowed only on designated whitelisted transfer stations. All files scanned before transfer to lower levels.
Level 4–5 (Enterprise) Corporate IT, ERP, email Standard corporate USB security policy with default-deny and serial-number whitelisting.

2. Dedicated USB Transfer Stations

Instead of allowing USB devices to connect directly to control systems, create designated transfer stations — hardened workstations positioned at the boundary between IT and OT networks. Every USB device coming into the OT environment passes through this checkpoint.

A transfer station should:

This approach means USB devices never touch production systems directly. The transfer station acts as a decontamination chamber for data entering the OT network.

3. Vendor and Contractor USB Management

Third-party access is one of the biggest USB risks in manufacturing. Equipment vendors, system integrators, and maintenance contractors routinely bring USB devices to update firmware, collect diagnostics, or configure equipment. Without controls, you're trusting every vendor's USB hygiene — and their entire supply chain.

Implement a vendor USB protocol:

  1. No personal USB devices in the OT zone. Vendors must use facility-issued devices or transfer files through the USB transfer station.
  2. Pre-register vendor devices. When a maintenance visit is scheduled, the vendor submits device serial numbers in advance. IT adds them to a temporary whitelist that expires when the maintenance window closes.
  3. Escort and witness. All USB connections to Level 0–2 systems are witnessed by plant operations staff and logged in the change management system.
  4. Post-visit audit. After vendor work, review USB event logs for any unexpected connections or file transfers.

4. Physical Port Controls for Legacy and Unmanaged Systems

Not every system in a manufacturing environment can run a software agent. Legacy PLCs, embedded HMIs, and real-time controllers often have USB ports that can't be protected with software. For these systems, physical controls are necessary:

5. Offline-First Policy Enforcement

Air-gapped OT networks can't rely on cloud-based policy engines. Your USB security solution must enforce policies locally, without any network connectivity, and sync logs when a connection is available.

This means:

Solutions that require real-time cloud connectivity for policy decisions are a non-starter for manufacturing environments. If the agent can't enforce policy when disconnected, it can't protect an air-gapped network. Read our guide on USB security for disconnected endpoints for more on offline enforcement architecture.

6. USB Event Monitoring and Anomaly Detection

Logging isn't just for compliance — it's your early warning system. In OT environments, USB anomalies are often the first indicator of an attack or insider threat. Monitor for:

Feed USB event data into your existing OT security monitoring — whether that's a SIEM, a historian-based monitoring system, or a dedicated OT security platform. Correlate USB events with other indicators: a USB connection followed by a PLC program change is a much higher-priority event than either alone.

USB Device Control Built for OT Environments

PortGuard's lightweight Windows agent enforces default-deny USB policies with full offline support. Serial-number whitelisting, device-class blocking, and comprehensive logging work without cloud connectivity — exactly what air-gapped OT networks need. Deploy in audit mode first, enforce when ready. Free for up to 5 devices.

Start Free — No Credit Card Required

Manufacturing USB Security Policy Template

Adapt this template to your specific environment. The structure maps to IEC 62443 and NIST 800-82 requirements:

Section 1: Scope and Zones

This policy applies to all USB-capable devices within the OT network boundary (Purdue Levels 0–3.5), including PLCs, HMIs, SCADA servers, engineering workstations, historians, MES terminals, and any Windows or Linux endpoint connected to the industrial control network. Enterprise IT systems (Levels 4–5) are covered by the corporate USB policy.

Section 2: Default Posture

All USB mass storage devices are blocked by default on all OT endpoints. USB Human Interface Devices (keyboards, mice) are allowed only on endpoints where they are required for operation. All other USB device classes (wireless adapters, network adapters, imaging devices) are blocked unless specifically approved.

Section 3: Approved Devices and Transfer Procedures

USB storage devices used in the OT environment must be procured, provisioned, and tracked by the IT/OT security team. Each device is registered by serial number and assigned to a specific use case (e.g., historian data export, PLC firmware update). All data transfers to OT systems pass through the designated USB transfer station for malware scanning and file-type validation.

Section 4: Vendor and Contractor Access

Third-party personnel must use facility-issued USB devices or transfer files through the USB transfer station. Personal USB devices are prohibited in OT zones. Vendor device serial numbers must be submitted 48 hours before scheduled maintenance. Temporary whitelist entries expire at the end of the maintenance window. All vendor USB activity is logged and reviewed within 24 hours.

Section 5: Incident Response

Any unauthorized USB device detected in the OT environment triggers the following response: (1) Immediate isolation of the affected endpoint from the control network, (2) Notification to the plant operations manager and IT/OT security team, (3) Forensic capture of the USB event log and device metadata, (4) Assessment of whether the device accessed or modified any control system configuration, (5) Root cause analysis and corrective action documented in the change management system.

Implementation Roadmap for Manufacturing

Deploying USB security in a production environment requires careful planning. You cannot afford a policy change that halts a production line. Here's a phased approach:

  1. Weeks 1–3: Discovery and inventory. Deploy agents in audit-only mode on all Windows endpoints in the OT network. Catalog every USB device that connects, every port that's active, and every workflow that depends on USB. Simultaneously, physically inventory USB ports on unmanaged systems (PLCs, embedded HMIs). This phase produces your baseline: how many devices, which vendors, what workflows, and where the gaps are.
  2. Weeks 4–5: Policy design. Map your findings to the Purdue Model. Define zone-specific policies. Build your device whitelist from the audit data. Identify which ports need physical blockers. Design the USB transfer station workflow. Get buy-in from plant operations, maintenance, and engineering — they will be the ones most affected.
  3. Weeks 6–7: Transfer station deployment. Set up the USB transfer station at the IT/OT boundary. Train maintenance and engineering staff on the new workflow. Run both old and new processes in parallel during the transition.
  4. Weeks 8–10: Phased enforcement. Enable blocking on Level 4–5 (enterprise) endpoints first. Then Level 3 (operations/historian). Then Level 2 (HMI/SCADA). Level 0–1 gets physical port controls. At each level, run in warn mode for one week before switching to block mode. Monitor for production impact and adjust the whitelist as needed.
  5. Weeks 11+: Ongoing operations. Monthly whitelist reviews. Quarterly vendor access audits. Annual port inventory updates. Continuous monitoring for anomalous USB events. Every maintenance window that involves USB gets a pre-approved device list and a post-visit log review.

Common Mistakes in Manufacturing USB Security

Avoid these pitfalls that derail OT USB security programs:

Building the Business Case

Justifying USB security investment to plant leadership requires speaking their language — production uptime, not cybersecurity jargon:

Frame USB security as production continuity insurance, not an IT project. The question isn't whether you can afford USB controls — it's whether you can afford not to have them when a contractor plugs an infected drive into your SCADA server.

Moving Forward

Manufacturing and OT environments are where USB security matters most and where it's hardest to get right. The combination of air-gapped networks, legacy systems, vendor access requirements, and safety-critical processes creates constraints that don't exist in typical IT environments.

But those constraints don't make USB security impossible — they make it require a different approach. Zone-based policies mapped to the Purdue Model, dedicated transfer stations, physical port controls for unmanaged systems, and offline-first enforcement address the specific realities of manufacturing. Start with audit mode to understand your environment, build your policies around what you find, and enforce gradually from the enterprise level down to the plant floor.

The threat isn't theoretical. USB-borne attacks on industrial environments are increasing in frequency and sophistication. The organizations that act now — before an incident forces their hand — are the ones that maintain both security and production continuity.