STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← All Controls

SI-3

System and Information IntegrityRev 3

Malicious Code Protection

CCI Identifiers (18)

CCI-001239The organization employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.CCI-001240The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.CCI-001241Configure malicious code protection mechanisms to perform periodic scans of the system on an organization-defined frequency.CCI-001242The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.CCI-001243Configure malicious code protection mechanisms to block malicious code; quarantine malicious code; and/or take organization-defined action(s) in response to malicious code detection.CCI-001244Defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alerts to administrators.CCI-001245Address the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the system.CCI-001668The organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities.CCI-002619The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.CCI-002620The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.CCI-002621The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.CCI-002622The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.CCI-002623Defines the frequency for performing periodic scans of the system for malicious code.CCI-002624Configure malicious code protection mechanisms to perform real-time scans of files from external sources at endpoint; and/or network entry and exit points as the files are downloaded, opened, or executed in accordance with organizational policy.CCI-004963Implement signature based and/or non-signature based malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.CCI-004964Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy.CCI-004965Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management procedures.CCI-004966Configure malicious code protection mechanisms to send alerts to organization-defined personnel in response to malicious code detection.

Linked STIG Checks (142)

Across 29 STIGs. Click to expand.