Skip to contentCYBERINFO
|

Control 8.7 : Protection Against Malware


Summary

Protection against malware should be implemented and supported by appropriate user awareness. This involves a multi-layered technical defense to detect, prevent, and recover from malicious software across all organizational assets.


Applicability

In-Scope: Mandatory for all organizations. Malware remains one of the most significant threats to data integrity and availability, making this a core technical requirement.

Out-of-Scope: Never out-of-scope.


Implementation Guidance

Microsoft 365 / Entra ID

  • Endpoint Defense: Deploy Microsoft Defender for Endpoint to all managed devices, enforcing real-time protection, behavior monitoring, and cloud-delivered protection.

  • Email Security: Utilize Microsoft Defender for Office 365 to scan all incoming attachments and links (Safe Attachments/Safe Links) for malicious content before they reach the user.

  • Server Protection: Enable Microsoft Defender for Cloud to protect Azure-hosted servers and workloads from sophisticated malware and ransomware attacks.


Evidence Checklist

  • Malware Protection Policy: Rules for the installation, update, and management of anti-malware software.

  • Protection Status Reports: Logs from the Microsoft Defender portal showing that 100% of managed devices have active and up-to-date protection.

  • Incident History: Evidence of how the organization identified and remediated a recent malware detection.


Practical Audit Advice

Here are some questions the auditor might ask:

  • How do you ensure that users cannot bypass or disable the anti-malware software on their company-issued devices?

  • What is the frequency of signature and engine updates for your malware protection systems?

  • Can you demonstrate the process for isolating a device from the network automatically once malware is detected?

  • How are unmanaged files, such as those in personal cloud storage, prevented from introducing malware into the corporate environment?