CMMC Practice SI.L1-3.14.5

System & File Scanning: Perform periodic scans of organizational systems and real-time scans of files from external sources as files are downloaded, opened, or executed.

Monarch ISC Guidance

This practice specifies more configuration requirements, in this case, the need to automatically scan new files and devices automatically, and to schedule regular full scans of the devices at regular intervals, usually daily. Your policy will note the requirement to automatically scan files and devices, and the interval for your full scans. You should also define who gets alerted in your plan if action is taken to quarantine, clean, or delete an infected file. You will need to check the effectiveness of this control for maturity level four by regularly verifying scans are taking place as expected.

Discussion From Source

NIST SP 800-171 R2 Periodic scans of organizational systems and real-time scans of files from external sources can detect malicious code. Malicious code can be encoded in various formats (e.g., UUENCODE, Unicode), contained within compressed or hidden files, or hidden in files using techniques such as steganography. Malicious code can be inserted into systems in a variety of ways including web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of system vulnerabilities.

References