Preventions
- Home
- - Preventions
- -PV084
- ID: PV084
- Created: 10th March 2026
- Updated: 10th March 2026
- Contributor: Leonardo Segura
Physical Port Security for Workstations
Restrict physical access to USB and display ports on corporate workstations to prevent unauthorized hardware from being connected to the system.
Hardware-based remote access devices such as IP-KVM platforms require direct connection to the endpoint’s USB ports and video outputs in order to capture display output and inject keyboard or mouse input. If these physical interfaces are accessible, a subject may attach hardware capable of maintaining covert remote interaction with the system.
Implementing physical controls that limit access to these interfaces can significantly reduce the risk of unauthorized hardware devices being deployed on corporate endpoints.
Prevention Measures
- Disable unused USB ports through BIOS/UEFI configuration or endpoint management policies where operationally feasible.
- Use physical USB port blockers or locking port covers on systems deployed in shared offices, open workspaces, or other environments where unauthorized access to workstation ports is possible.
- Secure display interfaces such as HDMI or DisplayPort connections using cable management or port protection mechanisms to prevent insertion of intermediary capture devices.
- Establish workstation hardware inspection procedures during IT support visits, security audits, or equipment refresh cycles to identify unauthorized devices connected between system components.
- Maintain workstation configurations where peripheral cabling is visible and auditable, making it easier for support staff or security personnel to detect unfamiliar hardware devices attached to endpoints.
- Apply enhanced physical security measures to high-risk systems, including administrative workstations, developer environments, and systems that access sensitive or regulated data.