10

Malware Defenses

Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.

Why Is This Control Critical?

Malicious software (sometimes categorized as viruses, worms, Trojans, ransomware, spyware, adware, etc.) is an integral and dangerous aspect of internet threats. It can have many purposes, from capturing credentials, stealing data, identifying other targets within the network, and encrypting or destroying data. Malware is ever-evolving and adaptive, as modern variants leverage machine learning techniques. Malware enters an enterprise through vulnerabilities within the enterprise on end-user devices, email attachments, web pages, cloud services, mobile devices, and removable media. Malware often relies on insecure end-user behavior and social engineering to gain initial access, emphasizing the importance of security awareness training.

Safeguards (7)

ID Title Asset Type Function Implementation Groups
10.1 Deploy and Maintain Anti>Malware Software Devices Protect
IG1 IG2 IG3
10.2 Configure Automatic Anti>Malware Signature Updates Devices Protect
IG1 IG2 IG3
10.3 Disable Autorun and Autoplay for Removable Media Devices Protect
IG1 IG2 IG3
10.4 Configure Automatic Anti>Malware Scanning of Removable Media Devices Detect
IG2 IG3
10.5 Enable Anti>Exploitation Features Devices Protect
IG2 IG3
10.6 Centrally Manage Anti>Malware Software Devices Protect
IG2 IG3
10.7 Use Behavior>Based Anti>Malware Software Devices Detect
IG2 IG3