
SI-3: Malicious Code Protection - csf.tools
Implement [Assignment (one or more): signature-based, non-signature-based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; Automatically …
10: Malware Defenses - CSF Tools
Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
8: Malware Defenses - CSF Tools
Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and …
8.1: Utilize Centrally Managed Anti-malware Software - csf.tools
Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization's workstations and servers.
10.1: Deploy and Maintain Anti-Malware Software - CSF Tools
Deploy and maintain anti-malware software on all enterprise assets.
UEM-09: Anti-Malware Detection and Prevention - CSF Tools
Configure managed endpoints with anti-malware detection and prevention technology and services.
10.6: Centrally Manage Anti-Malware Software - CSF Tools
Control Statement Centrally manage anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]
TVM-02: Malware Protection Policy and Procedures - CSF Tools
Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to protect against malware on managed assets. Review and update the policies and procedures at …
SI-3: Malicious Code Protection - csf.tools
The organization: Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; Updates malicious code protection mechanisms …
10.7: Use Behavior-Based Anti-Malware Software - CSF Tools
Control Statement Use behavior-based anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]