An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.07.1-5f5778 - rmfrev4
Open sidebar
Navigate
Top
Search
CCIs (
5137
)
Pages (
87/172
)
CCIs
Number
Definition
Status
Related
CCI-002611
Defines the security-relevant software updates to be automatically installed on organization-defined system components.
Draft
SI-2(5)
CCI-002612
Defines the security-relevant firmware updates to be automatically installed on organization-defined system components.
Draft
SI-2(5)
CCI-002613
Install organization-defined security-relevant software updates automatically to organization-defined system components.
Draft
SI-2(5)
CCI-002614
Install organization-defined security-relevant firmware updates automatically to organization-defined system components.
Draft
SI-2(5)
CCI-002615
Defines the software components to remove previous versions after updated versions have been installed.
Draft
SI-2(6)
CCI-002616
Defines the firmware components to remove previous versions after updated versions have been installed.
Draft
SI-2(6)
CCI-002617
Remove previous versions of organization-defined software components after updated versions have been installed.
Draft
SI-2(6)
CCI-002618
Remove previous versions of organization-defined firmware components after updated versions have been installed.
Draft
SI-2(6)
CCI-002619
The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.
Draft
SI-3
CCI-002620
The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.
Draft
SI-3
CCI-002621
The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
Draft
SI-3
CCI-002622
The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.
Draft
SI-3
CCI-002623
Defines the frequency for performing periodic scans of the system for malicious code.
Draft
SI-3
CCI-002624
Configure malicious code protection mechanisms to perform real-time scans of files from external sources at endpoint; and/or network entry and exit points as the files are downloaded, opened, or executed in accordance with organizational policy.
Draft
SI-3
CCI-002625
When testing malicious code protection mechanisms, verify the detection of the code.
Draft
SI-3(6)
CCI-002626
When testing malicious code protection mechanisms, verify the associated incident reporting of the code occurs.
Draft
SI-3(6)
CCI-002627
The information system implements nonsignature-based malicious code detection mechanisms.
Draft
SI-3(7)
CCI-002628
Defines the unauthorized operating system commands that are to be detected through the kernel application programming interface on organization-defined system hardware components.
Draft
SI-3(8)
CCI-002629
Defines the system hardware components that are to detect organization-defined unauthorized operating system commands through the kernel programming application interface.
Draft
SI-3(8)
CCI-002630
Detect organization-defined unauthorized operating system commands through the kernel application programming interface at organization-defined system hardware components.
Draft
SI-3(8)
CCI-002631
Issue a warning; audit the command execution; and/or prevent the execution of the command when organization-defined unauthorized operating system commands are detected.
Draft
SI-3(8)
CCI-002632
The organization defines the remote commands that are to be authenticated using organization-defined safeguards for malicious code protection.
Draft
SI-3(9)
CCI-002633
The organization defines the security safeguards to be implemented to authenticate organization-defined remote commands for malicious code protection.
Draft
SI-3(9)
CCI-002634
Defines the tools to be employed to analyze the characteristics and behavior of malicious code.
Draft
SI-3(10)
CCI-002635
Defines the techniques to be employed to analyze the characteristics and behavior of malicious code.
Draft
SI-3(10)
CCI-002636
Employ organization-defined tools to analyze the characteristics and behavior of malicious code.
Draft
SI-3(10)
CCI-002637
The information system implements organization-defined security safeguards to authenticate organization-defined remote commands for malicious code protection.
Draft
SI-3(9)
CCI-002638
Employ organization-defined techniques to analyze the characteristics and behavior of malicious code.
Draft
SI-3(10)
CCI-002639
Incorporate the results from malicious code analysis into organizational incident response processes.
Draft
SI-3(10)
CCI-002640
Incorporate the results from malicious code analysis into organizational flaw remediation processes.
Draft
SI-3(10)
Prev
1...
83
84
85
86
87
88
89
90
91
...172
Next