The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
No STIG checks reference this CCI.