
SI-3: Malicious Code Protection - csf.tools
Implement [Assignment (one or more): signature-based, non-signature-based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; …
10: Malware Defenses - CSF Tools
Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.
8: Malware Defenses - CSF Tools
Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data …
8.1: Utilize Centrally Managed Anti-malware Software - csf.tools
Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization's workstations and servers.
10.1: Deploy and Maintain Anti-Malware Software - CSF Tools
Deploy and maintain anti-malware software on all enterprise assets.
UEM-09: Anti-Malware Detection and Prevention - CSF Tools
Configure managed endpoints with anti-malware detection and prevention technology and services.
10.6: Centrally Manage Anti-Malware Software - CSF Tools
Control Statement Centrally manage anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]
TVM-02: Malware Protection Policy and Procedures - CSF Tools
Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to protect against malware on managed assets. Review and update the policies …
SI-3: Malicious Code Protection - csf.tools
The organization: Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; Updates malicious code protection …
10.7: Use Behavior-Based Anti-Malware Software - CSF Tools
Control Statement Use behavior-based anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]