Skip to main content
NetStable
Level 2 MA.L2-3.7.4

Check media containing diagnostic and test programs for malicious code before use

πŸ“– What This Means

This practice requires organizations to scan any media (such as USB drives, CDs, or external hard drives) that contains diagnostic or test programs for malicious code before using them on systems. This ensures that no malware or unauthorized software is introduced into the organization's environment, which could compromise security or disrupt operations. For example, if a technician uses a USB drive to run a diagnostic tool on a server, the drive must first be scanned for viruses or other malicious code. This is critical because malware can spread quickly across networks, leading to data breaches or system downtime. Think of it as 'washing your hands before touching sensitive equipment'β€”it’s a simple step that prevents potential harm.

🎯 Why It Matters

Failing to scan media for malicious code can result in malware infections, data breaches, and operational disruptions. For instance, the 2017 NotPetya ransomware attack spread through compromised software updates, causing billions of dollars in damage globally. In a defense contracting context, introducing malware through unchecked media could expose Controlled Unclassified Information (CUI) or disrupt mission-critical systems. The DoD emphasizes this control because even unintentional lapses can compromise national security. The potential impact includes financial losses, reputational damage, and loss of contracts due to non-compliance.

βœ… How to Implement

  1. 1. Use cloud-native antivirus or endpoint protection tools (e.g., AWS Inspector, Azure Defender, or Google Cloud Security Scanner).
  2. 2. Configure automatic scanning for any external media connected to cloud-hosted virtual machines.
  3. 3. Set up alerts for any detected threats and quarantine infected files automatically.
  4. 4. Ensure all diagnostic tools and media are stored in secure, access-controlled cloud storage.
  5. 5. Train cloud administrators to manually scan media before use if automated tools are not available.
⏱️
Estimated Effort
2-3 hours for initial setup; ongoing effort includes monitoring and training (1-2 hours monthly). Skill level: Beginner to Intermediate.

πŸ“‹ Evidence Examples

Media Scanning Policy

Format: PDF/DOCX
Frequency: Annually or when updated.
Contents: Policy outlining procedures for scanning media before use.
Collection: Download from internal policy repository.

Scan Logs

Format: CSV/Log File
Frequency: Monthly.
Contents: Records of media scans, including timestamps and results.
Collection: Export from antivirus software.

Training Records

Format: PDF/Excel
Frequency: Annually.
Contents: List of employees trained on media scanning procedures.
Collection: Export from Learning Management System (LMS).

Approved Diagnostic Tools List

Format: PDF/Excel
Frequency: Quarterly.
Contents: List of approved diagnostic and test programs.
Collection: Download from IT department.

Incident Report

Format: PDF/DOCX
Frequency: As needed.
Contents: Documentation of any malware incidents related to media.
Collection: Generate from incident management system.

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For MA.L2-3.7.4 ("Check media containing diagnostic and test programs for malicious code before use"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how system maintenance is controlled, including scheduling, change management, tool approval, remote maintenance security, and personnel authorization. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"MA.L2-3.7.4 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to check media containing diagnostic and test programs for malicious code before us.... The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"MA.L2-3.7.4 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to check media containing diagnostic and test programs for malicious code before us.... Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"MA.L2-3.7.4 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify systems within the CUI boundary requiring maintenance
  • β€’ Document maintenance windows and change control process
  • β€’ Specify remote maintenance tools and access controls
  • β€’ Ensure this control covers all systems within your defined CUI boundary where check media containing diagnostic and test programs for malicious code before use applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ Maintenance Policy
  • πŸ“„ Change management records
  • πŸ“„ Approved maintenance tool inventory
  • πŸ“„ Remote maintenance session logs
  • πŸ“„ Evidence artifacts specific to MA.L2-3.7.4
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will review maintenance records for proper approval workflow, verify remote maintenance uses MFA and is logged, and check that non-company maintenance personnel are supervised.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a policy requiring media to be scanned before use?

βœ… YES β†’ Proceed to Q2.
❌ NO β†’ GAP: Draft and implement a media scanning policy within 2 weeks.

Question 2: Are all systems equipped with antivirus or endpoint protection software?

βœ… YES β†’ Proceed to Q3.
❌ NO β†’ GAP: Deploy antivirus software on all systems within 1 week.

Question 3: Is media scanning configured to occur automatically?

βœ… YES β†’ Proceed to Q4.
❌ NO β†’ GAP: Configure automatic scanning within 3 days.

Question 4: Are employees trained on media scanning procedures?

βœ… YES β†’ Proceed to Q5.
❌ NO β†’ GAP: Conduct training sessions within 1 month.

Question 5: Are scan logs maintained and reviewed regularly?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Set up log collection and review process within 1 week.

⚠️ Common Mistakes (What Auditors Flag)

1. Failing to scan media manually when automatic scanning is disabled.

Why this happens: Reliance on automated tools without backup procedures.
How to avoid: Train staff to manually scan media and enforce policy compliance.

2. Not updating antivirus software regularly.

Why this happens: Lack of monitoring or awareness.
How to avoid: Set up automatic updates and monitor software status.

3. Missing logs or incomplete documentation.

Why this happens: Failure to configure logging or assign responsibility.
How to avoid: Assign a team member to manage logs and review them monthly.

4. Using unapproved diagnostic tools.

Why this happens: Lack of a centralized approved tools list.
How to avoid: Maintain and distribute an updated list of approved tools.

5. Not training new employees on media scanning procedures.

Why this happens: Training is overlooked during onboarding.
How to avoid: Include media scanning training in the onboarding process.

πŸ“š Parent Policy

This practice is governed by the Maintenance Policy

View MA Policy β†’

πŸ“š Related Controls