Skip to main content

๐Ÿ’ผ CC6.8-5 Scans Information Assets from Outside the Entity for Malware and Other Unauthorized Software

Descriptionโ€‹

Procedures are in place to scan information assets that have been transferred or returned to the entity's custody for malware and other unauthorized software and to remove any items detected prior to its implementation on the network.

Similarโ€‹

  • Internal
    • ID: dec-c-d8b0b160

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags