Under active development Content is continuously updated and improved

SI-3(7)Malicious Code Protection

PBMM (P3)
Secret (P3)
Operational

>Control Description

MALICIOUS CODE PROTECTION | NONSIGNATURE-BASED DETECTION The information system implements non-signature-based malicious code detection mechanisms.

>Supplemental Guidance

Non-signature-based detection mechanisms include, for example, the use of heuristics to detect, analyze, and describe the characteristics or behaviour of malicious code and to provide safeguards against malicious code for which signatures do not yet exist or for which existing signatures may not be effective. This includes polymorphic malicious code (i.e., code that changes signatures when it replicates). This control enhancement does not preclude the use of signature-based detection mechanisms.

Ask AI

Configure your API key to use AI features.