STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← SI-3 — Malicious Code Protection

CCI-001668

Definition

The organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.

Parent Control

SI-3Malicious Code ProtectionSystem and Information Integrity

Linked STIG Checks (3)

V-214801CAT IThe Red Hat Enterprise Linux operating system must use a virus scan program.Red Hat Enterprise Linux 7 Security Technical Implementation GuideV-222386CAT IThe SUSE operating system must use a virus scan program.SUSE Linux Enterprise Server 12 Security Technical Implementation GuideV-12765CAT IIThe system must use and update a virus scan program.SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide