Content library
CyberFundamentals (Belgium)
DE.CM-4: Malicious code is detected.

How to fill the requirement

CyberFundamentals (Belgium)

DE.CM-4: Malicious code is detected.

Task name
Priority
Status
Theme
Policy
Other requirements
Selection and use of malware detection software on all devices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Malware protection
requirements

Task is fulfilling also these other security requirements

I09: Haittaohjelmasuojaus
Katakri
12.2.1: Controls against malware
ISO27 Full
12.2: Protection from malware
ISO27 Full
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Self-monitoring
DE.CM-4: Malicious code detection
NIST
1. Task description

Centrally select and install malware detection and repair programs and update them regularly for preventive or regular scanning of computers and media.

Programs should check at least the following:

  • files received over the network or storage media are scanned for malware before use
  • email attachments and downloaded files are scanned for malware before use
  • websites are scanned for malware
Automatically updating and running malware prevention software
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Malware protection
requirements

Task is fulfilling also these other security requirements

I09: Haittaohjelmasuojaus
Katakri
12.2.1: Controls against malware
ISO27 Full
12.2: Protection from malware
ISO27 Full
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Self-monitoring
MWP-01: Keeping anti-malware software up to date
Cyber Essentials
1. Task description

Malware protection systems automatically check for and install updates at desired intervals and also run the desired scans at the selected frequency without needed user actions.

Regular malware inspection of data systems supporting critical business processes
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Malware protection
requirements

Task is fulfilling also these other security requirements

12.2.1: Controls against malware
ISO27 Full
12.2: Protection from malware
ISO27 Full
PR.DS-6: Integrity checking
NIST
DE.CM-4: Malicious code detection
NIST
8.7: Protection against malware
ISO27k1 Full
1. Task description

The data systems (and their content) that support critical business processes are regularly reviewed to locate malware. All unauthorized files and changes will be formally investigated.

Detecting and blocking access to dangerous websites
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Malware protection
requirements

Task is fulfilling also these other security requirements

12.2.1: Controls against malware
ISO27 Full
12.2: Protection from malware
ISO27 Full
8.7: Protection against malware
ISO27k1 Full
8.23: Web filtering
ISO27k1 Full
CC6.8: Detection and prevention of unauthorized or malicious software
SOC 2
1. Task description

The organization must identify the types of websites that staff should and should not have access to.

The organization must consider blocking access to the following types of sites (either automatically or by other means):

  • websites with a file upload function, unless this is permitted for a specific business need
  • known or suspected malicious websites (e.g. distributing malware or containing phishing content)
  • command and control servers
  • websites distributing illegal content
Use malware systems from multiple vendors
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Malware protection
requirements

Task is fulfilling also these other security requirements

12.2.1: Controls against malware
ISO27 Full
12.2: Protection from malware
ISO27 Full
DE.CM-4: Malicious code detection
NIST
DE.CM-4: Malicious code is detected.
CyFun
1. Task description

We always use malware systems from multiple vendors to improve the likelihood of detecting malware.

No items found.