STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SC-35

System and Communications ProtectionRev 5system

External Malicious Code Identification

Control Statement

Include system components that proactively seek to identify network-based malicious code or malicious websites.

Supplemental Guidance

External malicious code identification differs from decoys in [SC-26](#sc-26) in that the components actively probe networks, including the Internet, in search of malicious code contained on external websites. Like decoys, the use of external malicious code identification techniques requires some supporting isolation measures to ensure that any malicious code discovered during the search and subsequently executed does not infect organizational systems. Virtualization is a common technique for achieving such isolation.

Related Controls (5)

SC-7SC-26SC-44SI-3SI-4

CCI Identifiers (1)

CCI-001196Include system components that proactively seek to identify network-based malicious code or malicious websites.

Linked STIG Checks (0)

No STIG checks reference this control.