10.7
IG2 IG3

Use Behavior>Based Anti>Malware Software

Control Group: 10. Malware Defenses
Asset Type: Devices
Security Function: Detect

Description

Use behavior-based anti-malware software.

Implementation Checklist

1
Deploy detection tools or enable detection capabilities
2
Configure alerting thresholds and notification channels
3
Establish monitoring schedule and review process
4
Test detection capabilities with simulated events
5
Document detection procedures and escalation paths
6
Deploy anti-malware solution to all applicable endpoints
7
Configure automatic signature updates
8
Enable real-time scanning and scheduled full scans
9
Establish centralized management and alerting

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Zero-Day Malware Evading Signature-Based Detection

Confidentiality

Novel malware with no existing signatures bypasses traditional signature-based anti-malware completely, and without behavior-based detection the malicious activity (file encryption, credential access, lateral movement) executes unchallenged.

Polymorphic Malware Defeating Static Analysis

Integrity

Malware that changes its code signature with each execution evades signature-based detection engines, requiring behavioral analysis to identify the malicious actions (process injection, persistence mechanisms, C2 communication) rather than static file characteristics.

Living-Off-the-Land Techniques Invisible to Signature Scanning

Confidentiality

Attackers use legitimate operating system tools and processes (PowerShell, WMI, certutil, mshta) to execute malicious actions that signature-based solutions cannot detect because the tools themselves are legitimate, requiring behavioral analysis to identify abuse.

Vulnerabilities (When Safeguard Absent)

Anti-Malware Relies Solely on Signature-Based Detection

The organization's anti-malware solution uses only static signature matching without behavioral analysis, heuristics, or machine learning capabilities, making it blind to zero-day threats, polymorphic malware, and fileless attack techniques.

No EDR or Next-Generation Endpoint Protection

The organization has not deployed endpoint detection and response (EDR) or next-generation antivirus (NGAV) solutions that monitor process behavior, API calls, and system interactions to detect malicious activity patterns regardless of file signatures.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Detection tool deployment evidence (dashboard screenshots, agent status) Captured monthly
Technical Sample alert/detection output demonstrating capability Captured quarterly
Technical Anti-malware deployment status and detection statistics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually

Related Policy Templates