Skip to main content

💼 SI-3 Malicious Code Protection

  • ID: /frameworks/nist-sp-800-53-r5/si/03

Description​

a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; b. Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures; c. Configure malicious code protection mechanisms to:

  1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or executed in accordance with organizational policy; and
  2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-defined action]]; and send alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.

Similar​

  • Internal
    • ID: dec-c-59106f9e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 SI-3 Malicious Code Protection (L)(M)(H)77no data
💼 FedRAMP Low Security Controls → 💼 SI-3 Malicious Code Protection (L)(M)(H)7no data
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected118no data
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected98no data
💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected112no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 SI-3(1) Malicious Code Protection _ Central Managementno data
💼 SI-3(2) Malicious Code Protection _ Automatic Updatesno data
💼 SI-3(3) Malicious Code Protection _ Non-privileged Usersno data
💼 SI-3(4) Malicious Code Protection _ Updates Only by Privileged Usersno data
💼 SI-3(5) Malicious Code Protection _ Portable Storage Devicesno data
💼 SI-3(6) Malicious Code Protection _ Testing and Verificationno data
💼 SI-3(7) Malicious Code Protection _ Nonsignature-based Detectionno data
💼 SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands6no data
💼 SI-3(9) Malicious Code Protection _ Authenticate Remote Commandsno data
💼 SI-3(10) Malicious Code Protection _ Malicious Code Analysisno data