🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Exceptions and Approval Workflow for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.21 Compliant Portable Device Use

Step-by-step guidance to build an auditable exceptions and approval workflow for portable storage device use that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AC.L2-3.1.21 requirements.

•
April 23, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Controlling and approving portable device use is a common stumbling block for small businesses pursuing NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance—this post delivers a practical, step-by-step exceptions and approval workflow you can implement today to make AC.L2-3.1.21 auditable, enforceable, and operationally realistic.

Overview and objectives

AC.L2-3.1.21 (NIST 3.1.21) requires that organizations control the use of portable storage devices to prevent unauthorized data transfer and malware introduction. The key objectives of an exceptions and approval workflow are: a) establish a deny-by-default posture for removable media; b) provide a documented, auditable path for authorized use; c) ensure technical controls (encryption, endpoint controls, logging) are applied; and d) limit risk through time-limited, reviewed exceptions. For Compliance Framework implementations, this means integrating policy, IT controls, and documented risk acceptance into your formal compliance artifacts (policy library, POA&M, CMDB/asset register).

Designing the exceptions and approval workflow

Start with a one-page policy stating removable media is prohibited except by approved exception. Then create an approval workflow with these elements: request intake (ITSM ticket or form), risk justification (purpose, data classification, required fields), technical vetting (IT security verifies encryption, anti-malware, asset tagging), managerial approval (supervisor + ISSO), and issuance (whitelisting device serial number or issuing corporate device). Required form fields: requester identity, business justification, data classification (e.g., FCI/CDI), device type and serial, duration (expiry), compensating controls, and signatures. Make the workflow auditable by assigning a unique exception ID and storing approvals and attachments in your ticketing system (ServiceNow, Jira Service Management, or a secured SharePoint library).

Approval matrix and roles

Define a clear approval matrix: low-risk (public/unclassified, short duration) may require supervisor + IT; medium-risk (internal/operational data) requires ISSO approval and ITD technical controls; high-risk (CDI/FCI or contractor access) requires CISO/authorizing official sign-off and documented risk acceptance. For small businesses, a two-tiered model (Manager + Security Lead) often balances control and agility—keep exceptions above a threshold (e.g., access to Controlled Unclassified Information) escalated to executive approval.

Technical enforcement and configuration details

Technical enforcement makes the workflow effective. Implement deny-by-default using endpoint controls: Group Policy for Windows (Computer Configuration → Policies → Administrative Templates → System → Removable Storage Access — enable "All Removable Storage classes: Deny all access" then create a policy exception using device whitelisting), Microsoft Intune/Endpoint Manager for mobile and modern Windows management, and Mobile Device Management (MDM) for Android/iOS. Use BitLocker for full-disk and removable drive encryption (manage-bde -status to check and manage-bde -on E: -RecoveryPassword to enable), and deploy Data Loss Prevention (DLP) policies to block copy operations for protected data. Network Access Control (NAC) can enforce posture checks and deny network access for devices without required controls. Maintain a whitelist of approved USB serial numbers and use EDR/DLP to alert on attempted use of unauthorized media, forwarding logs to your SIEM for retention and correlation.

Operational steps: provisioning, issuance, and revocation

When an exception is approved, follow a scripted provisioning sequence: 1) record device serial and link to employee asset record; 2) sanitize and provision device with corporate image; 3) enable encryption and anti-malware; 4) apply device certificate and MDM profile; 5) label/tag physically and digitally (asset tag, CMDB entry); 6) brief user on acceptable use and sign a user agreement; 7) set expiration and automated reminders in the ticketing system. Revocation must be equally scripted: remove whitelist entry, remotely wipe if MDM-managed, collect device physically, and log chain-of-custody. Automate expiration-based revocation to avoid forgotten exceptions.

Small business scenarios and real-world examples

Example 1: Field technician needing to collect diagnostic logs from an isolated OT device. Use an exception: request includes data classification ("operational logs"), duration (48 hours), required compensating controls (hashed device image, offline transfer to corporate ingest station), and IT configures a single-use, encrypted USB with a serial whitelist. Example 2: Engineering team transferring prototype CAD files to a supplier. Approver requires supplier NDA, encrypts files with company keys, issues a company-managed encrypted USB keyed to the engineer's machine, and logs the transfer in the project’s compliance folder. These small-business patterns use minimal tools (Intune + Azure AD + ServiceNow) but remain auditable and secure.

Risks of not implementing a workflow and best practices

If you omit a formal exceptions workflow you risk uncontrolled data exfiltration, malware outbreaks from unmanaged media, and audit findings that can cost DIB (Defense Industrial Base) contracts. Practical best practices: enforce deny-by-default, require device whitelisting by serial number, make exceptions time-limited and logged, require encryption and endpoint telemetry, monitor attempts (SIEM alerts), periodically review all open exceptions (quarterly), and capture exceptions in your POA&M with mitigation steps. For technical specifics, maintain GPO/Intune baselines, deploy manage-bde checks in endpoint configuration baselines (Compliance policies in Intune), and store recovery keys in a secured key escrow (Azure AD/BitLocker Recovery Keys or equivalent).

Compliance tips and continuous improvement

Keep the process lightweight but documented: provide exception request templates, sample justifications, and an approval SLA (e.g., 48 hours). Use automation where possible—ticket to device provisioning playbooks, expiration reminders, and SIEM-driven alerts for unauthorized device insertion. Regularly test the workflow with tabletop exercises (simulate a lost USB containing CDI) and capture lessons. Track metrics: number of exceptions, average duration, incidents tied to removable media, and time to revoke. Document each exception in your evidence folder for audits and include screenshots of approvals, device serials, and provisioning logs as artifacts.

In summary, an effective exceptions and approval workflow for AC.L2-3.1.21 combines a clear policy, an auditable intake and approval process, technical enforcement (deny-by-default, encryption, DLP, whitelisting), and lifecycle management (provisioning, labeling, revocation, and review). For small businesses, focus on simple, automatable controls and strong documentation to reduce risk and create defensible evidence for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.