Malware Defenses
Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
Why Is This Control Critical?
Malicious software (sometimes categorized as viruses, worms, Trojans, ransomware, spyware, adware, etc.) is an integral and dangerous aspect of internet threats. It can have many purposes, from capturing credentials, stealing data, identifying other targets within the network, and encrypting or destroying data. Malware is ever-evolving and adaptive, as modern variants leverage machine learning techniques. Malware enters an enterprise through vulnerabilities within the enterprise on end-user devices, email attachments, web pages, cloud services, mobile devices, and removable media. Malware often relies on insecure end-user behavior and social engineering to gain initial access, emphasizing the importance of security awareness training.
Related Policy Templates
Safeguards (7)
| ID | Title | Asset Type | Function | Implementation Groups |
|---|---|---|---|---|
| 10.1 | Deploy and Maintain Anti>Malware Software | Devices | Protect |
IG1
IG2
IG3
|
| 10.2 | Configure Automatic Anti>Malware Signature Updates | Devices | Protect |
IG1
IG2
IG3
|
| 10.3 | Disable Autorun and Autoplay for Removable Media | Devices | Protect |
IG1
IG2
IG3
|
| 10.4 | Configure Automatic Anti>Malware Scanning of Removable Media | Devices | Detect |
IG2
IG3
|
| 10.5 | Enable Anti>Exploitation Features | Devices | Protect |
IG2
IG3
|
| 10.6 | Centrally Manage Anti>Malware Software | Devices | Protect |
IG2
IG3
|
| 10.7 | Use Behavior>Based Anti>Malware Software | Devices | Detect |
IG2
IG3
|