🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Audit-Ready Checklist for Scanning Media Containing Diagnostic and Test Programs for Malicious Code — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.4

Practical step-by-step guidance to build an audit-ready checklist for scanning diagnostic/test media for malicious code to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.4.

April 16, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control MA.L2-3.7.4 requires organizations to scan removable and other media that contain diagnostic and test programs for malicious code — a specific, high-risk vector that small businesses often overlook. This post shows how to build an audit-ready checklist tied to the Compliance Framework, with concrete implementation steps, technical examples, and the kinds of evidence auditors expect.

Why scanning diagnostic/test media matters (risk overview)

Diagnostic tools, firmware images, vendor-provided test utilities, and service USBs frequently move between environments and often originate from third parties; if they are compromised they can introduce persistent backdoors, firmware-level malware, or supply-chain implants. For small businesses that handle Controlled Unclassified Information (CUI) or maintain DoD contracts, failing to detect malware on such media can lead to data exfiltration, lateral movement into core systems, contract penalties, and loss of business. Implementing MA.L2-3.7.4 effectively reduces this threat by forcing verification before the media touches operational systems.

Audit-ready checklist — what to include

Below is a practical checklist you can adapt. For each item, require documentary evidence (policy, SOP, tool configs, logs, sample scan results) and map items to MA.L2-3.7.4 in your compliance matrix.

  • Policy and SOP: Formal policy requiring scan-before-connect for any diagnostic/test media; SOP with step-by-step scanning workflow and roles (who scans, who authorizes use).
  • Authorized Tools List: Inventory of approved on-demand scanners, sandbox engines, YARA rule sets, and hardware (write-blockers, forensic workstations) with versions.
  • Staging and Quarantine Procedure: Defined staging area (air-gapped or isolated VM) and quarantine handling for suspicious files, including chain-of-custody form template.
  • Signature/Rule Update Evidence: Automated or manual update schedule for AV signatures, YARA rules, and heuristics with update logs and timestamps.
  • Scan Logs and Hashes: Exported scan logs showing timestamps, operator ID, tool version, detected items; SHA-256 hashes of scanned media and of any suspicious artifacts.
  • Sandboxing / Behavioral Analysis: Procedure and evidence for executing unknown binaries in a sandbox (Cuckoo, QEMU/KVM snapshots) with behavioral reports.
  • Exceptions and Approval Records: Signed exception forms when a device must be used despite scans, with risk acceptance and compensating controls.
  • Training and Attestations: Training roster showing personnel trained on the SOP and signed attestations for tool use and media handling.
  • Retention and Evidence Storage: Log retention time (e.g., 1 year or per contract requirement), secure evidence locker (WORM or controlled directory) for quarantined files and reports.

Implementation details — technical steps and sample commands

Practical scan workflow for small shops: 1) Attach media to a dedicated forensic workstation or boot a scan appliance (Linux live USB with tools). 2) Mount read-only: e.g., mount -o ro /dev/sdb1 /mnt/staging. 3) Create hashes: sha256sum /dev/sdb > /var/evidence/media-sdb.sha256. 4) Run on-demand AV and YARA: clamscan --infected --recursive /mnt/staging > /var/log/scans/clam-YYYYMMDD.log; yara -r /etc/yara/custom_rules.yar /mnt/staging > /var/log/scans/yara-YYYYMMDD.log. 5) For unknown executables, run in sandbox: cuckoo submit /mnt/staging/binary.exe and collect behavioral reports. Automate these with a small script that timestamps, appends operator ID, and stores logs to a central syslog or SIEM for auditability.

Offline and air-gapped scanning

Some diagnostic devices are used in environments with no network access. For those, maintain a bootable scanning appliance with current signatures updated before going offline (stamp update time in the evidence). Use tools that support offline signature bundles (e.g., ClamAV freshclam mirror, Bitdefender offline update files). Ensure the offline appliance itself is hardened and checksummed; record the appliance build and checksum as part of the evidence set.

Logging, evidence and audit artifacts

Auditors expect timestamps, identities, tool versions, and immutable evidence. Produce logs that include: operator username, start/end times, tool name/version, signature/YARA rule set versions, scan results, and SHA-256 hashes. Example artifacts: scan log files, quarantine manifests (CSV with filename, hash, detection name, reason), signed exception forms, screenshot of sandbox behavior, and the MD5/SHA256 of the scanning appliance image. Integrate events into auditd and forward to your SIEM (e.g., rsyslog -> Splunk/Elastic) so attachment events and scans are correlated and searchable.

Real-world small business scenarios and examples

Example A — Small defense contractor: a field technician receives a vendor USB containing diagnostic firmware. The SOP requires the tech to bring it to a secure maintenance VM, mount read-only, run a two-engine scan (commercial AV + ClamAV), YARA rules for known bad patterns, and a sandbox execution for any unsigned binaries. All artifacts (scan logs, SHA-256, vendor receipt) are uploaded to the contract evidence folder with timestamps. Example B — Auto repair shop: OEM diagnostic dongles are shared between bays; the shop uses a dedicated offline laptop to scan and verify dongle content weekly, keeping logs for 180 days to satisfy OEM and insurance requirements.

Compliance tips and best practices

Keep the checklist practical and measurable: tie each item to evidence types and retention periods. Use automation to reduce human error (scripted scanning, centralized log collection). Maintain a small authorized-tools whitelist and periodically validate the tools themselves (checksums and signed updates). Train technicians on why scanning matters and require sign-off for exceptions. Use YARA rules tailored to your industry (manufacturing, medical devices, automotive) to catch domain-specific threats. Finally, document any false positives and remediation steps — auditors will look for process consistency, not perfection.

In summary, building an audit-ready checklist for MA.L2-3.7.4 means codifying a repeatable scan-and-evidence workflow: written policy, approved tools, isolated staging, automated scans (with specific commands and updates), sandbox analysis for unknowns, and robust logging and retention. For small businesses, the focus should be on simplicity, automation, and keeping clear artifacts (logs, hashes, signed approvals) that demonstrate you consistently scan diagnostic and test media before they touch operational systems.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes