Skip to main content
NetStable
Level 1 SI.L1-3.14.4

Update malicious code protection mechanisms when new releases are available

πŸ“– What This Means

This control requires organizations to keep their antivirus and other malicious code protection software up to date by applying updates as soon as they become available. This means regularly checking for updates from the software vendor and ensuring they are installed promptly. For example, if your antivirus software releases a new update to detect a recently discovered virus, you need to install that update immediately to protect your systems. Similarly, if your email filtering tool gets an update to block a new type of phishing attack, you should apply it without delay. The goal is to ensure your defenses are always equipped to handle the latest threats.

🎯 Why It Matters

Failing to update malicious code protection mechanisms leaves systems vulnerable to new threats. Cybercriminals constantly develop new malware, and outdated protections may not detect or block these threats. For instance, the WannaCry ransomware attack in 2017 exploited systems that hadn’t applied recent security updates, causing billions in damages globally. From the DoD/CMMC perspective, this control is critical because defense contractors handle sensitive government information. Outdated protections could lead to data breaches, mission disruption, and reputational damage.

βœ… How to Implement

  1. Enable automatic updates for cloud-native antivirus tools like AWS GuardDuty or Microsoft Defender for Cloud.
  2. Configure Azure Security Center to monitor and enforce malware protection updates across virtual machines.
  3. Use GCP Security Command Center to ensure malware protection tools are updated in GCP environments.
  4. Set up alerts in your cloud provider’s dashboard to notify you of available updates.
  5. Schedule regular scans to verify that updates are applied.
  6. Document update processes in your cloud security policy.
⏱️
Estimated Effort
2-4 hours per month (basic IT skills required)

πŸ“‹ Evidence Examples

Antivirus update logs

Format: PDF or CSV
Frequency: Monthly
Contents: Timestamped records of installed updates
Collection: Export logs from antivirus software

Cloud security center reports

Format: PDF
Frequency: Monthly
Contents: Summary of malware protection update status
Collection: Download from cloud provider’s dashboard

Update policy document

Format: PDF
Frequency: Annually
Contents: Written procedures for updating malicious code protection tools
Collection: Create and maintain in your document management system

Training records

Format: PDF
Frequency: Annually
Contents: Documentation of staff training on update procedures
Collection: Maintain in HR or training system

Test environment logs

Format: PDF or CSV
Frequency: Monthly
Contents: Records of update testing in a controlled environment
Collection: Export from test systems

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SI.L1-3.14.4 ("Update malicious code protection mechanisms when new releases are available"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your system and information integrity controls, including patch management process, antivirus/EDR deployment, email gateway protection, SIEM monitoring, and application security measures. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SI.L1-3.14.4 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to update malicious code protection mechanisms when new releases are available. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SI.L1-3.14.4 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to update malicious code protection mechanisms when new releases are available. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SI.L1-3.14.4 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all systems requiring patch management within the CUI boundary
  • β€’ Document EDR/AV coverage across endpoints and servers
  • β€’ Specify SIEM monitoring coverage and alert rules
  • β€’ Ensure this control covers all systems within your defined CUI boundary where update malicious code protection mechanisms when new releases are available applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ System and Information Integrity Policy
  • πŸ“„ Patch management reports
  • πŸ“„ AV/EDR deployment records
  • πŸ“„ SIEM alert configuration
  • πŸ“„ Evidence artifacts specific to SI.L1-3.14.4
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify patch management SLAs are met, check AV/EDR deployment coverage (should be 100%), review SIEM alert rules and response times, and test that email gateway blocks malicious content.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have malicious code protection tools installed on all systems?

βœ… YES β†’ Proceed to Q2
❌ NO β†’ GAP: Install antivirus or malware protection software on all systems. Timeline: 1 week.
Remediation:
Identify missing systems and deploy protection tools.

Question 2: Are automatic updates enabled for your malicious code protection tools?

βœ… YES β†’ Proceed to Q3
❌ NO β†’ GAP: Enable automatic updates or create a manual update schedule. Timeline: 3 days.
Remediation:
Configure software settings to enable automatic updates.

Question 3: Do you maintain logs of installed updates?

βœ… YES β†’ Proceed to Q4
❌ NO β†’ GAP: Begin logging updates and retain records for at least 6 months. Timeline: 1 week.
Remediation:
Export logs from your antivirus or cloud security tools.

Question 4: Are updates tested before deployment?

βœ… YES β†’ Proceed to Q5
❌ NO β†’ GAP: Set up a test environment for update validation. Timeline: 2 weeks.
Remediation:
Create a controlled testing environment and document test results.

Question 5: Do you have a written update policy?

βœ… YES β†’ Compliance confirmed
❌ NO β†’ GAP: Draft and implement an update policy. Timeline: 2 weeks.
Remediation:
Document update procedures in your security policy.

⚠️ Common Mistakes (What Auditors Flag)

1. Failing to enable automatic updates

Why this happens: Manual update processes are often overlooked.
How to avoid: Configure software to update automatically and verify settings regularly.

2. Not testing updates before deployment

Why this happens: Lack of a controlled testing environment.
How to avoid: Set up a test environment and validate updates before rolling them out.

3. Incomplete update logs

Why this happens: Logs are not exported or maintained systematically.
How to avoid: Schedule regular log exports and store them securely.

4. Missing systems in inventory

Why this happens: Systems are not tracked or documented.
How to avoid: Maintain an updated inventory of all systems with protection tools.

5. Outdated update policy

Why this happens: Policies are not reviewed or updated regularly.
How to avoid: Review and update your update policy annually.

πŸ“š Parent Policy

This practice is governed by the System and Information Integrity Policy

View SI Policy β†’

πŸ“š Related Controls