Under active development Content is continuously updated and improved

ISM-0917ISM-0917

>Control Description

When malicious code is detected, the following steps are taken to handle the infection: · the infected systems are isolated · all previously connected media used in the period leading up to the infection are scanned for signs of infection and isolated if necessary · antivirus software is used to remove the infection from infected systems and media · if the infection cannot be reliably removed, systems are restored from a known good backup or rebuilt.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.