STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← All Controls

SI-3

System and Information IntegrityRev 5organization

Malicious Code Protection

Baselines:LowModerateHigh

Control Statement

a. Implement [Selection: organization-defined value] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; b. Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures; c. Configure malicious code protection mechanisms to: 1. Perform periodic scans of the system [Assignment: frequency] and real-time scans of files from external sources at [Selection: organization-defined value] as the files are downloaded, opened, or executed in accordance with organizational policy; and 2. [Selection: organization-defined value] ; and send alert to [Assignment: personnel or roles] in response to malicious code detection; and d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.

Supplemental Guidance

System entry and exit points include firewalls, remote access servers, workstations, electronic mail servers, web servers, proxy servers, notebook computers, and mobile devices. Malicious code includes viruses, worms, Trojan horses, and spyware. Malicious code can also be encoded in various formats contained within compressed or hidden files or hidden in files using techniques such as steganography. Malicious code can be inserted into systems in a variety of ways, including by electronic mail, the world-wide web, and portable storage devices. Malicious code insertions occur through the exploitation of system vulnerabilities. A variety of technologies and methods exist to limit or eliminate the effects of malicious code. Malicious code protection mechanisms include both signature- and nonsignature-based technologies. Nonsignature-based detection mechanisms include artificial intelligence techniques that use heuristics to detect, analyze, and describe the characteristics or behavior of malicious code and to provide controls against such code for which signatures do not yet exist or for which existing signatures may not be effective. Malicious code for which active signatures do not yet exist or may be ineffective includes polymorphic malicious code (i.e., code that changes signatures when it replicates). Nonsignature-based mechanisms also include reputation-based technologies. In addition to the above technologies, pervasive configuration management, comprehensive software integrity controls, and anti-exploitation software may be effective in preventing the execution of unauthorized code. Malicious code may be present in commercial off-the-shelf software as well as custom-built software and could include logic bombs, backdoors, and other types of attacks that could affect organizational mission and business functions. In situations where malicious code cannot be detected by detection methods or technologies, organizations rely on other types of controls, including secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to ensure that software does not perform functions other than the functions intended. Organizations may determine that, in response to the detection of malicious code, different actions may be warranted. For example, organizations can define actions in response to malicious code detection during periodic scans, the detection of malicious downloads, or the detection of maliciousness when attempting to open or execute files.

Related Controls (19)

AC-4AC-19CM-3CM-8IR-4MA-3MA-4PL-9RA-5SC-7SC-23SC-26SC-28SC-44SI-2SI-4SI-7SI-8SI-15

CCI Identifiers (18)

CCI-001668The organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.CCI-002619The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.CCI-002620The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.CCI-002621The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.CCI-002622The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.CCI-002624Configure malicious code protection mechanisms to perform real-time scans of files from external sources at endpoint; and/or network entry and exit points as the files are downloaded, opened, or executed in accordance with organizational policy.CCI-001239The organization employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.

Linked STIG Checks (142)

Across 29 STIGs. Click to expand.

CCI-001240The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
CCI-001241Configure malicious code protection mechanisms to perform periodic scans of the system on an organization-defined frequency.
CCI-001242The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.
CCI-001243Configure malicious code protection mechanisms to block malicious code; quarantine malicious code; and/or take organization-defined action(s) in response to malicious code detection.
CCI-001244Defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alerts to administrators.
CCI-001245Address the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the system.
CCI-002623Defines the frequency for performing periodic scans of the system for malicious code.
CCI-004963Implement signature based and/or non-signature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
CCI-004964Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy.
CCI-004965Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management procedures.
CCI-004966Configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection.