🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How small businesses can cost-effectively implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII malicious code protections: tools, timelines, and templates

Practical, low-cost steps and templates for small businesses to meet FAR 52.204-21 / CMMC 2.0 Level 1 malicious-code protections (SI.L1-B.1.XIII) with tools, timelines, and audit-ready documentation.

β€’
April 12, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Small businesses that handle federal contract information must meet FAR 52.204-21 and the equivalent CMMC 2.0 Level 1 control SI.L1-B.1.XIII, which requires basic malicious code protections β€” this post gives pragmatic, cost-effective implementation steps, concrete tools, a realistic timeline (0–90 days), and templates you can adapt to demonstrate compliance to auditors.

What SI.L1-B.1.XIII / FAR 52.204-21 requires (practical interpretation)

At Level 1, SI.L1-B.1.XIII expects you to protect systems that store, process, or transmit Covered Contractor Information (CCI) against malicious code through baseline anti-malware/anti-spyware protections, timely updates, and routine scans. For small businesses using the Compliance Framework, treat this as a set of minimum technical safeguards: endpoint protection enabled with real-time scanning, automated signature/definition updates, basic email/file scanning controls, and simple detection/response steps. Documented policies and operational evidence (logs, scan results, update records) are necessary to show you executed these controls.

Cost-effective tools and configurations (what to buy or enable)

Leverage built-in platform protections before buying premium tools: Microsoft Defender for Business (included or low-cost with Microsoft 365 Business), built-in macOS XProtect + Malware Removal Tool, and reputable free/low-cost options (Malwarebytes for Business, Sophos Home/Intercept X Essentials, CrowdStrike Falcon (small org pricing), or open-source ClamAV for Linux servers). Complement endpoint protection with an email gateway that blocks known-malicious attachments (Google Workspace/Gmail or Microsoft Defender for Office 365). Use centralized management (Microsoft Intune, Google Workspace device management, or a low-cost RMM) to enforce policy and produce audit logs. Cost-saving tip: enable Windows Defender full-featured protection and use Intune’s basic MDM policies for centralization instead of standalone EDR for very small teams.

Windows-specific practical steps

For Windows endpoints, enable Windows Defender real-time protection, cloud-delivered protection, and automatic sample submission. Example PowerShell commands to verify and enable core features (run as admin): "Set-MpPreference -DisableRealtimeMonitoring $false", "Set-MpPreference -DisableAutoExclusions $false", "Add-MpPreference -ExclusionPath 'C:\\SomePath\\'". Force update signatures with "Update-MpSignature". Use Intune to push Defender configuration profiles (attack surface reduction rules, controlled folder access) and schedule weekly full scans. Maintain a device inventory via Azure AD/Intune so you can show you applied the settings across all managed machines.

Linux and macOS practical steps

On Linux servers, deploy ClamAV with freshclam configured as a cron or systemd timer and integrate periodic scans into monitoring (add scan output to a simple log ingestor). For macOS, ensure Gatekeeper/XProtect and automatic system updates are enabled; consider Malwarebytes for macOS to supplement built-in detection. For all OSes, enforce automatic OS updates where possible, restrict privilege escalation (no persistent admin accounts for daily use), and use application allowlisting where feasible (AppLocker on Windows, MDM-based app control on macOS). Store scan and update logs centrallyβ€”use a lightweight log collector (Fluentd/CloudWatch/Log Analytics) or export Defender logs for evidence.

Timelines and a realistic 0–90 day project plan

Day 0–7: Inventory and gap analysis β€” identify all endpoints, servers, email systems, and where CCI resides; map to the Compliance Framework control SI.L1-B.1.XIII. Day 8–21: Policy and tool selection β€” adopt a one-page Malicious Code Protection Policy (template below), pick tools (e.g., Defender + Intune or Defender + Malwarebytes), and set up centralized management. Day 22–45: Deployment β€” roll out endpoint agents and email protections in staged waves (pilot 5–10 machines, then expand), enable auto-updates and scheduled scans, and configure logging. Day 46–75: Evidence collection and refinement β€” consolidate logs, run full scans, resolve detections, and document remediation steps; create POA&M entries for any gaps. Day 76–90: Audit-ready packaging β€” assemble policy, configuration screenshots, agent deployment reports, scan logs, and an incident playbook; perform a tabletop to validate response steps. This timeline is achievable for a 5–50 person company using internal resources and a single MSP if needed.

Templates, documentation, and evidence you should produce

Key artifacts auditors expect: 1) Malicious Code Protection Policy (one page: scope, roles, update cadence, exception process), 2) Configuration Baseline Checklist (showing Defender/agent settings, scheduled scan cadence, update configs), 3) Deployment Report (agent install counts and dates), 4) Weekly/Monthly Scan and Update Logs (or export from central console), 5) POA&M for unresolved items with target dates, and 6) Incident Response mini-playbook for a single infected endpoint (isolate, collect forensic snapshot, remediate, restore from backup). A minimal policy sentence example: "All endpoints processing CCI must run an approved anti-malware agent with real-time protection and auto-signature updates enabled; deviations require documented exception and compensating controls." Store these docs in a versioned repository (SharePoint, Git, or encrypted cloud folder) and retain them for at least one contract cycle.

Risks of not implementing SI.L1-B.1.XIII and compliance tips

Failing to implement these protections increases risk of ransomware, data exfiltration of CCI, loss of contracts, and penalties under FAR; a single infected endpoint can enable lateral movement into sensitive project data. Compliance tips: document everything (deployment dates, exceptions, remediation actions), use least privilege, enforce MFA on admin accounts, back up CCI with immutable backups and test restores quarterly, and treat evidence collection as part of operations (automate log exports). Small businesses often avoid audits by demonstrating consistent, repeatable controls rather than perfect technology β€” the auditor wants proof you applied and maintained basic safeguards.

Summary: For small businesses, meeting FAR 52.204-21 / CMMC 2.0 Level 1 malicious-code protections is practical and affordable if you leverage built-in OS protections, centralize management (Intune/Google Workspace), enforce auto-updates and scheduled scans, and produce a short set of audit artifacts (policy, baseline, deployment reports, logs, and a mini incident playbook). With a 0–90 day plan, basic tooling, and simple templates you can cost-effectively reduce risk and demonstrate compliance to contracting officers and assessors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes