🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Automate Periodic Malware and Integrity Scans Across Endpoints and Cloud Storage: Practical Steps for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV

Practical, step‑by‑step guidance to automate periodic malware and file integrity scans across endpoints and cloud storage to meet FAR 52.204-21 / CMMC 2.0 Level 1 requirements.

April 20, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows practical, implementable steps to automate periodic malware detection and file/firmware integrity monitoring across endpoints and cloud storage to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 Control SI.L1-B.1.XV—covering what to scan, how to automate scans, what technical tools to use, and how to demonstrate evidence for audits.

Implementation overview

Start by scoping assets (endpoints, servers, cloud object stores, SaaS attachments) and classifying them by risk. For Compliance Framework implementation, create a documented inventory that includes OS, hosting environment (on‑prem / AWS / Azure / GCP), agent capability (can host an EDR/AV agent?), and whether the data is Covered Defense Information (CDI). This inventory drives scan frequency and tooling choices: higher‑risk assets get daily/real‑time scanning while lower‑risk endpoints may be scanned weekly. Record the inventory and the risk-based scan schedule in your security documentation to satisfy audit evidence requirements.

Inventory and scope — practical steps

Use automated discovery: run an active inventory with tools like Microsoft Intune / Azure AD, AWS Systems Manager (SSM) inventory for EC2, or an agentless scan such as Nmap + Ansible to detect unmanaged devices. Export a CSV with hostname, OS, cloud bucket names, owner, and whether an agent is installed. Example small‑business scenario: a 25-person contractor with Azure AD and an AWS S3 bucket—inventory will identify 18 Windows laptops (enable Microsoft Defender for Endpoint), 3 Linux jump hosts (install ClamAV + AIDE), and one S3 bucket storing deliverables (enable object scanning or an event-driven scan pipeline).

Endpoint malware scanning: tools and automation

Prefer managed EDR/AV that supports both on-access and periodic full scans. For Windows endpoints, enable Microsoft Defender real‑time protection and configure a scheduled quick/full scan via Group Policy or Intune (e.g., weekly full scan, daily quick scan). For small shops using third‑party EDR, ensure agents are configured to auto‑update signatures and report to a console. For Linux servers, automate periodic clamscan or use a commercial agent; example commands: install ClamAV (apt install clamav clamav-daemon), update signatures (freshclam) and run scheduled scans via cron or AWS SSM Run Command. Use Ansible or an MDM to push scan schedules and ensure signature updates are enabled.

Cloud storage scanning: event-driven and periodic approaches

Cloud object stores require a different model: either use cloud-native malware protection (Microsoft Defender for Cloud / Azure Storage, Google Cloud Antivirus partners, AWS Malware Protection partners) or build an event-driven pipeline. A common pattern on AWS: enable S3 event notifications to trigger a Lambda that downloads the object into /tmp, runs ClamAV (or calls an AV API like VirusTotal or an AV container), and then tags the object with a scan status (e.g., x-amz-meta-scan-status: clean/infected). For Azure Blob Storage, use Event Grid -> Azure Function to scan and add metadata or quarantine by moving to a 'quarantine' container. Include versioning and object-lock or immutable backups so scanning actions cannot be used to alter evidence.

File integrity monitoring (FIM) and firmware integrity

FIM detects unauthorized changes to critical files, binaries, and firmware. For Linux, deploy AIDE or OSSEC/Wazuh: install (apt install aide), initialize the DB (aideinit), and schedule periodic checks (0 2 * * * entries) that run aide --check and send diffs to your SIEM or Slack channel. For Windows, use Sysinternals Sigcheck and Scheduled Tasks or commercial FIM built into EDRs. For firmware integrity, maintain vendor attestations and use firmware update management—document baseline firmware versions and sign/verify firmware where supported. Store FIM logs centrally (Wazuh/Elastic/Cloud SIEM) for retention and audit export.

Automation, orchestration, and alerting

Centralize alerts in a SIEM (Splunk, Elastic, Azure Sentinel, or OSS Wazuh) and create playbooks: when a scan flags malware or a FIM deviation, auto-create a ticket in your ITSM, isolate the endpoint (EDR containment API), and mark the cloud object as quarantined. Use cloud-native serverless + orchestration: SNS/SQS or Event Grid for event routing, Lambda/Functions for scanning and remediation, and Step Functions/Logic Apps for multi-step incident workflows. Maintain runbooks that specify evidence capture (screenshots, logs, hashes) and timelines to prove compliant handling under FAR/CMMC audits.

Compliance tips, documentation, and evidence

Document the policies that define scan frequency, signature update cadence, FIM baseline cadence, and exception handling. Keep retained logs for the period your contract requires (often 6–12 months). Capture: inventory exports, scan configuration screenshots, sample alert records, quarantined object records (with original object hash), and remediation tickets. For each automated pipeline, version and store the orchestration code (Terraform, CloudFormation, ARM, or Git) and include CI/CD logs demonstrating deployment. During an audit, be ready to show the chain: asset inventory -> scheduled scan config -> scan result -> remediation evidence.

Risk of not implementing SI.L1-B.1.XV

Failure to implement periodic malware and integrity scans increases the risk of undetected compromise, lateral movement, exfiltration of CDI, and delivery of infected artifacts to the DoD. Noncompliance can lead to contract penalties, loss of future contracts, or immediate termination of current agreements. Operationally, lack of automation means slow detection and response, higher mean time to detect (MTTD), and greater recovery costs following an incident—risks that small businesses with limited security staff cannot absorb.

Summary: implement a risk‑based scanning program that combines managed EDR/AV on endpoints, event-driven malware scanning for cloud storage, and robust file/firmware integrity monitoring. Automate orchestration and alerting, centralize logs for evidence, document policies and exceptions, and ensure signatures and baselines are refreshed regularly—these practical steps will help you meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XV while keeping the solution maintainable for a small business.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes