CCI-004966
CCI-004966 Definition
| Status | |
| Type | CheckType.technical |
Master Assessment Datasheet
Implementation Guidance
Determine if: - malicious code protection mechanisms are configured to [SI-03_ODP[04]; one or more of the following PARAMETER VALUES is/are selected: {block malicious code; quarantine malicious code; take [SI-03_ODP[05]; action to be taken in response to malicious code detection are defined (if selected)}] in response to malicious code detection. - malicious code protection mechanisms are configured to send alerts to [SI-03_ODP[06]; personnel or roles to be alerted when malicious code is detected is/are defined] in response to malicious code detection.
Validation Procedures
Examine: [SELECT FROM: System and information integrity policy; system and information integrity procedures; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; system design documentation; system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; system audit records; system security plan; other relevant documents or records]. Interview: [SELECT FROM: System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the system; organizational personnel responsible for malicious code protection; organizational personnel with configuration management responsibilities]. Test: [SELECT FROM: Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational processes for addressing false positives and resulting potential impacts; mechanisms supporting and/or implementing, employing, updating, and configuring malicious code protection mechanisms; mechanisms supporting and/or implementing malicious code scanning and subsequent actions].