SI-3—Malicious Code Protection
>Control Description
Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code;
Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures;
Configure malicious code protection mechanisms to:
Perform periodic scans of the system ⚙organization-defined frequency and real-time scans of files from external sources at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or executed in accordance with organizational policy; and
[Selection (one or more): block malicious code; quarantine malicious code; take ⚙organization-defined action]; and send alert to ⚙organization-defined personnel or roles in response to malicious code detection; and
Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.
>Related Controls
Ask AI
Configure your API key to use AI features.