Skip to main content

💼 SI-3 Malicious Code Protection

Description​

a. Implement [Selection (one or more): signature based; non-signature based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; b. Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures; c. Configure malicious code protection mechanisms to:

  1. Perform periodic scans of the system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more): endpoint; network entry and exit points] as the files are downloaded, opened, or executed in accordance with organizational policy; and
  2. [Selection (one or more): block malicious code; quarantine malicious code; take [Assignment: organization-defined action]]; and send alert to [Assignment: organization-defined personnel or roles] in response to malicious code detection; and d. Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.

Similar​

  • Internal
    • ID: dec-c-59106f9e

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 SI-3 Malicious Code Protection (L)(M)(H)77
💼 FedRAMP Low Security Controls → 💼 SI-3 Malicious Code Protection (L)(M)(H)7
💼 NIST CSF v2.0 → 💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected117
💼 NIST CSF v2.0 → 💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected97
💼 NIST CSF v2.0 → 💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected111

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 SI-3(1) Malicious Code Protection _ Central Management
💼 SI-3(2) Malicious Code Protection _ Automatic Updates
💼 SI-3(3) Malicious Code Protection _ Non-privileged Users
💼 SI-3(4) Malicious Code Protection _ Updates Only by Privileged Users
💼 SI-3(5) Malicious Code Protection _ Portable Storage Devices
💼 SI-3(6) Malicious Code Protection _ Testing and Verification
💼 SI-3(7) Malicious Code Protection _ Nonsignature-based Detection
💼 SI-3(8) Malicious Code Protection _ Detect Unauthorized Commands5
💼 SI-3(9) Malicious Code Protection _ Authenticate Remote Commands
💼 SI-3(10) Malicious Code Protection _ Malicious Code Analysis