STIGhub
STIGs
RMF Controls
Compare
← All Controls
SI-3
System and Information Integrity
Rev 3
Malicious Code Protection
CCI Identifiers (18)
CCI-001239
The organization employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.
CCI-001240
The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
CCI-001241
Configure malicious code protection mechanisms to perform periodic scans of the system on an organization-defined frequency.
CCI-001242
The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.
CCI-001243
Configure malicious code protection mechanisms to block malicious code; quarantine malicious code; and/or take organization-defined action(s) in response to malicious code detection.
CCI-001244
Defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alerts to administrators.
CCI-001245
Address the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the system.
CCI-001668
The organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.
CCI-002619
The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.
CCI-002620
The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.
CCI-002621
The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
CCI-002622
The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.
CCI-002623
Defines the frequency for performing periodic scans of the system for malicious code.
CCI-002624
Configure malicious code protection mechanisms to perform real-time scans of files from external sources at endpoint; and/or network entry and exit points as the files are downloaded, opened, or executed in accordance with organizational policy.
CCI-004963
Implement signature based and/or non-signature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
CCI-004964
Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy.
CCI-004965
Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management procedures.
CCI-004966
Configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection.
Linked STIG Checks (142)
Across 29 STIGs. Click to expand.
▶
Akamai KSD Service Impact Level 2 ALG Security Technical Implementation Guide
3 checks
▶
Application Layer Gateway Security Requirements Guide
8 checks
▶
Arctic Wolf CylanceON-PREM Security Technical Implementation Guide
2 checks
▶
CA API Gateway ALG Security Technical Implementation Guide
5 checks
▶
Cisco ASA IPS Security Technical Implementation Guide
5 checks
▶
DBN-6300 IDPS Security Technical Implementation Guide
1 check
▶
F5 BIG-IP Application Security Manager Security Technical Implementation Guide
1 check
▶
F5 BIG-IP TMOS ALG Security Technical Implementation Guide
1 check
▶
Intrusion Detection and Prevention Systems (IDPS) Security Requirements Guide
6 checks
▶
Intrusion Detection and Prevention Systems Security Requirements Guide
6 checks
▶
Juniper SRX Services Gateway IDPS Security Technical Implementation Guide
5 checks
▶
Juniper SRX SG IDPS Security Technical Implementation Guide
8 checks
▶
Mainframe Product Security Requirements Guide
3 checks
▶
McAfee Application Control 7.x Security Technical Implementation Guide
5 checks
▶
Microsoft Defender Antivirus Security Technical Implementation Guide
23 checks
▶
Microsoft Defender for Endpoint Security Technical Implementation Guide
21 checks
▶
Microsoft Exchange 2016 Edge Transport Server Security Technical Implementation Guide
7 checks
▶
Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide
1 check
▶
Microsoft Exchange 2019 Mailbox Server Security Technical Implementation Guide
2 checks
▶
Microsoft Internet Explorer 11 Security Technical Implementation Guide
3 checks
▶
Mozilla Firefox Security Technical Implementation Guide
1 check
▶
Palo Alto Networks ALG Security Technical Implementation Guide
5 checks
▶
Palo Alto Networks IDPS Security Technical Implementation Guide
4 checks
▶
Red Hat Enterprise Linux 7 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server 12 Security Technical Implementation Guide
1 check
▶
SUSE Linux Enterprise Server v11 for System z Security Technical Implementation Guide
1 check
▶
Trellix Application Control 8.x Security Technical Implementation Guide
5 checks
▶
Trend Micro Deep Security 9.x Security Technical Implementation Guide
4 checks
▶
Trend Micro TippingPoint IDPS Security Technical Implementation Guide
4 checks