SC-35 External Malicious Code Identification

System and Communications Protection

Description

Include system components that proactively seek to identify network-based malicious code or malicious websites.

Supplemental Guidance

External malicious code identification differs from decoys in SC-26 in that the components actively probe networks, including the Internet, in search of malicious code contained on external websites. Like decoys, the use of external malicious code identification techniques requires some supporting isolation measures to ensure that any malicious code discovered during the search and subsequently executed does not infect organizational systems. Virtualization is a common technique for achieving such isolation.

Changes from Rev 4

Title changed from 'Honeyclients' to 'External Malicious Code Identification' in Rev 5.

MITRE ATT&CK Techniques (3)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Defense Evasion 1 Credential Access 1 Lateral Movement 1

Compliance Mappings

PCI DSS v4.0.1

11.55.3

RBI CSF

Annex1.13

EU CRA

CRA.I.2k

SEBI CSCRF

DE.CM

CBEST

CBEST.4

TIBER-EU

TIBER.RT