Skip to main content

πŸ’Ό SI-3 Malicious Code Protection

Description​

a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; b. Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures; c. Configure malicious code protection mechanisms to:

  1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or executed in accordance with organizational policy; and
  2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-defined action]]; and send alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.

Similar​

  • Internal
    • ID: dec-c-59106f9e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό SI-3 Malicious Code Protection (L)(M)(H)77
πŸ’Ό FedRAMP Low Security Controls β†’ πŸ’Ό SI-3 Malicious Code Protection (L)(M)(H)7
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected81
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected68
πŸ’Ό NIST CSF v2.0 β†’ πŸ’Ό PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected66

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό SI-3(1) Malicious Code Protection _ Central Management
πŸ’Ό SI-3(2) Malicious Code Protection _ Automatic Updates
πŸ’Ό SI-3(3) Malicious Code Protection _ Non-privileged Users
πŸ’Ό SI-3(4) Malicious Code Protection _ Updates Only by Privileged Users
πŸ’Ό SI-3(5) Malicious Code Protection _ Portable Storage Devices
πŸ’Ό SI-3(6) Malicious Code Protection _ Testing and Verification
πŸ’Ό SI-3(7) Malicious Code Protection _ Nonsignature-based Detection
πŸ’Ό SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands3
πŸ’Ό SI-3(9) Malicious Code Protection _ Authenticate Remote Commands
πŸ’Ό SI-3(10) Malicious Code Protection _ Malicious Code Analysis