SI-03 Malicious Code Protection

System and Information Integrity

Low Moderate High

Description

The information system implements malicious code protection.

Supplemental Guidance

The organization employs malicious code protection mechanisms at critical information system entry and exit points (e.g., firewalls, electronic mail servers, web servers, proxy servers, remote-access servers) and at workstations, servers, or mobile computing devices on the network. The organization uses the malicious code protection mechanisms to detect and eradicate malicious code (e.g., viruses, worms, Trojan horses, spyware) transported: (i) by electronic mail, electronic mail attachments, Internet accesses, removable media (e.g., USB devices, diskettes or compact disks), or other common means; or (ii) by exploiting information system vulnerabilities. The organization updates malicious code protection mechanisms (including the latest virus definitions) whenever new releases are available in accordance with organizational configuration management policy and procedures. The organization considers using malicious code protection software products from multiple vendors (e.g., using one vendor for boundary devices and servers and another vendor for workstations). The organization also considers the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system. NIST Special Publication 800-83 provides guidance on implementing malicious code protection.

Changes from Rev 4

Parameter adds '[Selection (one or more): signature based; non-signature based]'; another parameter adds requirement to send an alert to specified personnel Parameter selection eliminates option to send an alert to specified personnel and adds option to take specified action Discussion expanded to explain signature- and non-signature-based technologies Incorporates withdrawn controls SI-03(2) and SI-03(7)

MITRE ATT&CK Techniques (226)

ATT&CK v16.1

Techniques mitigated by this control, mapped via CTID.

Reconnaissance 4 Initial Access 8 Execution 25 Persistence 36 Privilege Escalation 48 Defense Evasion 71 Credential Access 21 Discovery 3 Lateral Movement 7 Collection 13 Command & Control 32 Exfiltration 11 Impact 9
Show all 226 techniques grouped by tactic

Persistence

Privilege Escalation

T1037 T1055 T1068 T1543 T1548 T1574 T1611 T1037.002 T1037.003 T1037.004 T1037.005 T1055.001 T1055.002 T1055.003 T1055.004 T1055.005 T1055.008 T1055.009 T1055.011 T1055.012 T1055.013 T1055.014 T1055.015 T1098.004 T1543.002 T1546.002 T1546.003 T1546.004 T1546.006 T1546.013 T1546.014 T1546.016 T1547.002 T1547.005 T1547.006 T1547.007 T1547.008 T1547.009 T1547.013 T1548.004 T1548.006 T1574.001 T1574.004 T1574.007 T1574.008 T1574.009 T1574.013 T1574.014

Defense Evasion

T1027 T1036 T1055 T1070 T1211 T1218 T1221 T1548 T1562 T1574 T1622 T1027.002 T1027.007 T1027.008 T1027.009 T1027.010 T1027.012 T1027.013 T1027.014 T1036.003 T1036.005 T1036.008 T1055.001 T1055.002 T1055.003 T1055.004 T1055.005 T1055.008 T1055.009 T1055.011 T1055.012 T1055.013 T1055.014 T1055.015 T1070.001 T1070.002 T1070.003 T1070.007 T1070.008 T1070.009 T1070.010 T1218.001 T1218.002 T1218.003 T1218.004 T1218.005 T1218.008 T1218.009 T1218.012 T1218.013 T1218.014 T1218.015 T1548.004 T1548.006 T1553.003 T1562.001 T1562.002 T1562.004 T1562.006 T1562.011 T1564.004 T1564.008 T1564.009 T1564.012 T1574.001 T1574.004 T1574.007 T1574.008 T1574.009 T1574.013 T1574.014

Command & Control

Compliance Mappings

ISO 27001:2022

A.8.23A.8.7

ISO 27002:2022

8.238.7

COBIT 2019

DSS05

CIS Controls v8

CIS 10CIS 10.1CIS 10.2CIS 10.4CIS 10.6CIS 10.7CIS 9CIS 9.3CIS 9.6CIS 9.7

NIST CSF 2.0

RS.MI-02

SOC 2 TSC

CC6.6CC6.6-POF2CC6.8CC9.2-POF13

PCI DSS v4.0.1

5.15.25.36.4

CSA CCM v4

TVM-02TVM-04UEM-09

CSA AICM v1

TVM-02TVM-04UEM-09

MAS TRM

11

APRA CPS 234

Para 22-23

ASD Essential Eight

E8-3E8-3 ML2

BSI IT-Grundschutz

APP.1.1OPS.1.1.4

ANSSI

Hygiene.21SecNumCloud.13.1

FINMA Circular 2023/1

IV.B.d(59)IV.C(64)IV.C(65)

OSFI B-13

B-13.3.2B-13.3.3

EU GDPR

Art.32(1)(b)

EU DORA

Art.9(4)(b)

BIO2

8.238.7

RBI CSF

Annex1.13

FISC Security Guidelines

FISC.T14FISC.T7

LGPD + BCB 4893

BCB.Art.3LGPD.Art.46

HKMA TM-E-1

TME1.10.1TME1.7.3

MLPS 2.0

8.1.10.58.1.3.38.1.3.48.1.4.5

DNB Good Practice

DNB.19.1

EU CRA

CRA.I.2i

SWIFT CSCF

SWIFT.6.1

SAMA CSF

3.3

NCA ECC

2-32-4

UAE IA

T7

CBB TM

TM-8

Qatar NIA

OS

CBUAE

CR-7

CBE CSF

CTO-7CTO-8

SA JS2

JS2-7.2JS2-8.4

CBN CSF

Part3.3

BoG CISD

CISD-VI

POPIA

s19

IOSCO Cyber Resilience

DET-3

CPMI-IOSCO PFMI

CG.DECG.PR

FFIEC IS

II.C.12

NYDFS 500

500.14

HIPAA Security Rule

§164.308(a)(5)(ii)(B)

ECB CROE

CROE.2.3.4CROE.2.4

EBA ICT Guidelines

3.4.4

SEBI CSCRF

DE.DPPR.ES

BOT Cyber Resilience

Ch2.6Ch8.2

CMMC 2.0

SI

NERC CIP

CIP-007-6

10 CFR 73.54

RG5.71-A-SI

API 1164

Sec 7

IAEA NSS 17-T

Sec 5.4

FIPS 140-3

FIPS 140-3 §7.6

ISAE 3402

Clause 4

Lloyd's Minimum Standards

MS8.10

NAIC Insurance Data Security

4-monitoring4B

HITRUST CSF v11

09.c

FDA Cybersecurity Guidance

PU-3

ISO 27799

12.2

NHS DSPT

NDG-9.3NDG-9.4

CCSS v9.0

1.01.31.05.4

Basel SCO60

SCO60.51SCO60.64SCO60.65

ISO 17799 (legacy)

10.4.1

COBIT 4.1 (legacy)

DS5.9