Skip to main content
NetStable
Level 1 SI.L1-3.14.2

Provide protection from malicious code at designated locations

📖 What This Means

This control requires organizations to implement measures that protect systems from malicious software (malware) at specific locations where it is most critical. This means ensuring that antivirus or anti-malware software is installed, configured correctly, and kept up to date on all designated systems. It also involves regularly scanning these systems for malicious code and taking action if any is detected. For example, a defense contractor might install antivirus software on all computers used to handle Controlled Unclassified Information (CUI) and configure it to update virus definitions daily. Another example is implementing endpoint detection and response (EDR) tools on servers that process sensitive data.

🎯 Why It Matters

Malicious code, such as viruses, ransomware, and spyware, can compromise sensitive data, disrupt operations, and lead to costly breaches. For instance, the 2017 WannaCry ransomware attack affected hundreds of thousands of systems globally, causing billions in damages. In the context of defense contractors, a malware infection could expose CUI, leading to national security risks and severe penalties. The DoD emphasizes this control to ensure that contractors safeguard sensitive information and maintain operational integrity. Without proper protection, organizations risk data loss, financial penalties, and damage to their reputation.

How to Implement

  1. Enable built-in malware protection services like AWS GuardDuty or Azure Defender.
  2. Configure automated virus definition updates for all cloud-hosted virtual machines.
  3. Install endpoint protection software on cloud-based endpoints.
  4. Set up regular automated scans for malicious code on cloud storage buckets.
  5. Use cloud-native tools like AWS Inspector or Azure Security Center to monitor for malware activity.
  6. Ensure all cloud workloads are covered by anti-malware policies.
  7. Log and review malware detection alerts in cloud monitoring tools.
⏱️
Estimated Effort
Initial setup: 2-3 days (Basic IT skills). Ongoing maintenance: 1-2 hours weekly (Basic IT skills).

📋 Evidence Examples

Antivirus installation records

Format: PDF or screenshot
Frequency: Initial setup, then quarterly
Contents: List of systems with antivirus installed and version numbers
Collection: Export from antivirus management console

Virus definition update logs

Format: CSV or log file
Frequency: Weekly
Contents: Timestamped records of definition updates
Collection: Export from antivirus software

Scan reports

Format: PDF or Excel
Frequency: Weekly
Contents: Results of full system scans, including detected threats
Collection: Export from antivirus software

Policy document

Format: Word or PDF
Frequency: Annual review
Contents: Anti-malware policy detailing installation, updates, and scans
Collection: Create and maintain

Training records

Format: Excel or PDF
Frequency: Annually
Contents: List of employees trained on malware prevention
Collection: Maintain in HR system

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SI.L1-3.14.2 ("Provide protection from malicious code at designated locations"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your system and information integrity controls, including patch management process, antivirus/EDR deployment, email gateway protection, SIEM monitoring, and application security measures. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SI.L1-3.14.2 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to provide protection from malicious code at designated locations. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SI.L1-3.14.2 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to provide protection from malicious code at designated locations. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SI.L1-3.14.2 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify all systems requiring patch management within the CUI boundary
  • Document EDR/AV coverage across endpoints and servers
  • Specify SIEM monitoring coverage and alert rules
  • Ensure this control covers all systems within your defined CUI boundary where provide protection from malicious code at designated locations applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 System and Information Integrity Policy
  • 📄 Patch management reports
  • 📄 AV/EDR deployment records
  • 📄 SIEM alert configuration
  • 📄 Evidence artifacts specific to SI.L1-3.14.2
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify patch management SLAs are met, check AV/EDR deployment coverage (should be 100%), review SIEM alert rules and response times, and test that email gateway blocks malicious content.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Is antivirus software installed on all designated systems?

✅ YES → Proceed to Q2
❌ NO → GAP: Install antivirus software on all systems. Use tools like Symantec or Windows Defender. Timeline: 1 week.
Remediation:
Install antivirus software immediately.

Question 2: Is the antivirus software configured to update virus definitions automatically?

✅ YES → Proceed to Q3
❌ NO → GAP: Configure automatic updates in the antivirus settings. Timeline: 1 day.
Remediation:
Enable automatic updates.

Question 3: Are regular full system scans scheduled and performed?

✅ YES → Proceed to Q4
❌ NO → GAP: Schedule weekly full system scans in the antivirus software. Timeline: 1 day.
Remediation:
Set up weekly scans.

Question 4: Are malware detection logs reviewed regularly?

✅ YES → Proceed to Q5
❌ NO → GAP: Assign staff to review logs weekly. Timeline: 1 week.
Remediation:
Assign log review responsibilities.

Question 5: Is there a documented anti-malware policy?

✅ YES → Compliance confirmed.
❌ NO → GAP: Create and document an anti-malware policy. Timeline: 1 week.
Remediation:
Draft and approve the policy.

⚠️ Common Mistakes (What Auditors Flag)

1. Not updating virus definitions regularly

Why this happens: Lack of awareness or configuration oversight
How to avoid: Enable automatic updates and verify logs weekly.

2. Missing antivirus installation on some systems

Why this happens: Incomplete inventory or oversight
How to avoid: Maintain a system inventory and verify coverage.

3. Failing to document scans and detections

Why this happens: Lack of process or documentation
How to avoid: Automate report generation and store centrally.

4. Not training employees on malware prevention

Why this happens: Training not prioritized
How to avoid: Include malware prevention in annual security training.

5. Using outdated antivirus software

Why this happens: Neglecting software maintenance
How to avoid: Regularly update and replace outdated software.

📚 Parent Policy

This practice is governed by the System and Information Integrity Policy

View SI Policy →

📚 Related Controls