Skip to main content
NetStable
Level 1 SI.L1-3.14.5

Perform periodic scans of organizational systems

πŸ“– What This Means

This practice requires organizations to regularly scan their systems for vulnerabilities and other security issues. Think of it like a health check-up for your IT systemsβ€”just as you would visit a doctor periodically to ensure you're healthy, your systems need regular scans to ensure they're secure. These scans help identify weaknesses that could be exploited by hackers. For example, if your company uses outdated software, a scan will flag it so you can update it before it becomes a problem. Regular scans are a key part of maintaining a secure environment and protecting sensitive information.

🎯 Why It Matters

Failing to perform periodic scans can leave your systems vulnerable to attacks. According to a 2023 report, 60% of breaches occurred due to unpatched vulnerabilities. For defense contractors, this is especially critical because compromised systems can lead to the loss of sensitive government data, hefty fines, and damage to your reputation. The DoD emphasizes this control to ensure that defense contractors maintain a strong security posture. Without regular scans, you risk missing vulnerabilities that could be exploited, potentially leading to data breaches or compliance failures.

βœ… How to Implement

  1. 1. Enable built-in vulnerability scanning tools in your cloud provider (e.g., AWS Inspector, Azure Security Center, GCP Security Command Center).
  2. 2. Configure scanning schedules to run at least weekly.
  3. 3. Set up alerts for critical vulnerabilities.
  4. 4. Integrate scan results with your ticketing system for remediation tracking.
  5. 5. Ensure scans cover all assets, including virtual machines, containers, and databases.
⏱️
Estimated Effort
Initial setup: 8-12 hours (Intermediate skill level). Ongoing: 2-4 hours per week for review and remediation.

πŸ“‹ Evidence Examples

Scanning schedule

Format: PDF/Spreadsheet
Frequency: Monthly
Contents: Dates/times of scans, systems covered
Collection: Export from scanning tool or document manually

Scan reports

Format: PDF/CSV
Frequency: Weekly/Monthly
Contents: List of vulnerabilities, severity levels, affected systems
Collection: Export from scanning tool

Remediation tracking

Format: Spreadsheet/Ticketing system export
Frequency: Weekly
Contents: Vulnerability details, remediation actions, completion dates
Collection: Export from ticketing system or document manually

Policy document

Format: PDF
Frequency: Annually or as updated
Contents: Scanning frequency, responsible personnel, procedures
Collection: Create and maintain in document repository

πŸ“ SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SI.L1-3.14.5 ("Perform periodic scans of organizational systems"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your system and information integrity controls, including patch management process, antivirus/EDR deployment, email gateway protection, SIEM monitoring, and application security measures. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SI.L1-3.14.5 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to perform periodic scans of organizational systems. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SI.L1-3.14.5 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to perform periodic scans of organizational systems. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SI.L1-3.14.5 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • β€’ Identify all systems requiring patch management within the CUI boundary
  • β€’ Document EDR/AV coverage across endpoints and servers
  • β€’ Specify SIEM monitoring coverage and alert rules
  • β€’ Ensure this control covers all systems within your defined CUI boundary where perform periodic scans of organizational systems applies
  • β€’ Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • πŸ“„ System and Information Integrity Policy
  • πŸ“„ Patch management reports
  • πŸ“„ AV/EDR deployment records
  • πŸ“„ SIEM alert configuration
  • πŸ“„ Evidence artifacts specific to SI.L1-3.14.5
  • πŸ“„ POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify patch management SLAs are met, check AV/EDR deployment coverage (should be 100%), review SIEM alert rules and response times, and test that email gateway blocks malicious content.

πŸ’¬ Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do you have a documented schedule for performing system scans?

βœ… YES β†’ Proceed to Q2
❌ NO β†’ GAP: Create a scanning schedule and document it. Remediate within 1 week.
Remediation:
Use a template to outline scanning frequency and systems covered.

Question 2: Are scans performed at least monthly?

βœ… YES β†’ Proceed to Q3
❌ NO β†’ GAP: Adjust scanning frequency to meet CMMC requirements. Remediate within 1 week.
Remediation:
Update your scanning tool settings or policy document.

Question 3: Do you review and remediate scan results promptly?

βœ… YES β†’ Proceed to Q4
❌ NO β†’ GAP: Implement a process for reviewing and addressing vulnerabilities. Remediate within 2 weeks.
Remediation:
Set up alerts and integrate scan results with your ticketing system.

Question 4: Are scan reports and remediation actions documented?

βœ… YES β†’ Proceed to Q5
❌ NO β†’ GAP: Establish a documentation process for scan results and remediation. Remediate within 2 weeks.
Remediation:
Use a spreadsheet or ticketing system to track actions.

Question 5: Do you have a policy outlining scanning procedures?

βœ… YES β†’ Compliance confirmed.
❌ NO β†’ GAP: Create a policy document detailing scanning procedures. Remediate within 1 month.
Remediation:
Use a template to draft and approve the policy.

⚠️ Common Mistakes (What Auditors Flag)

1. Not scanning all systems

Why this happens: Overlooking certain assets like IoT devices or virtual machines.
How to avoid: Ensure your scanning tool is configured to cover all assets.

2. Infrequent scans

Why this happens: Default tool settings or lack of awareness.
How to avoid: Set scans to run weekly or monthly and document the schedule.

3. Ignoring scan results

Why this happens: Lack of resources or prioritization.
How to avoid: Integrate scan results with a ticketing system for tracking.

4. Incomplete documentation

Why this happens: Failure to maintain records.
How to avoid: Use templates and automate report generation where possible.

5. Not updating scanning tools

Why this happens: Neglecting tool maintenance.
How to avoid: Regularly update your scanning tools to ensure accuracy.

πŸ“š Parent Policy

This practice is governed by the System and Information Integrity Policy

View SI Policy β†’

πŸ“š Related Controls