🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Implementation Checklist for Protecting Against Malicious Code — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII

Practical, step-by-step checklist guidance to implement protections against malicious code to meet FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII requirements for small businesses.

March 30, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Protecting against malicious code is a foundational requirement under FAR 52.204-21 and CMMC 2.0 Level 1 (control SI.L1-B.1.XIII); this post gives you a practical implementation checklist tailored for small businesses, with technical commands, low-cost options, verification steps, and evidence you need to demonstrate compliance.

Why a checklist matters for Compliance Framework requirements

A checklist turns high-level requirements into repeatable technical and procedural actions. FAR 52.204-21 requires basic safeguarding of contractor information; CMMC SI.L1-B.1.XIII expects that you actively protect systems from malicious code. A good checklist: (a) defines specific controls you will implement, (b) assigns owners and frequencies, (c) documents verification evidence, and (d) lists acceptable compensating controls and exceptions.

Core components of the malicious-code protection implementation checklist

Your checklist should include the following items (each item should have an owner, due frequency, expected evidence, and a pass/fail criteria): 1) Asset inventory and classification (list endpoints, servers, mobile devices, cloud workloads); 2) Endpoint protection baseline (AV/EDR installed and configured); 3) Patch management status (OS and third‑party updates); 4) Application allowlisting or software restriction policies; 5) Email and web gateway protections (attachment blocking, sandboxing, URL filtering); 6) Scheduled full scans and signature/definition update verification; 7) Logging and alerting (endpoint logs forwarded to SIEM or local log store); 8) Incident response playbook entry for malware events; 9) User awareness training and phishing exercises; 10) Exception and change-control records for deviations.

Practical implementation details and technical examples

Small business example implementations: if you use Windows endpoints, enable Microsoft Defender and keep signatures current. Example PowerShell checks: Get-MpComputerStatus (shows Defender health), Update-MpSignature (updates signatures), and Set-MpPreference -DisableRealtimeMonitoring $false (ensure real-time protection enabled). For Linux servers, install ClamAV for basic scanning (apt-get install clamav; freshclam; clamscan -r /var/www) and use rkhunter or chkrootkit periodically. For macOS, verify Gatekeeper and XProtect are enabled, and maintain definitions via softwareupdate commands. If you can afford it, deploy a lightweight EDR (CrowdStrike, SentinelOne, Microsoft Defender for Endpoint) that provides behavioral detection, remote triage, and telemetry important for evidence collection.

Detection, response, and evidence collection

Checklist entries must include detection and response actions and required evidence: ensure endpoint logs are collected for a minimum retention period (e.g., 90 days), define alert criteria, and test alert-to-escalation times. For example, configure Windows Event Forwarding or a cloud log ingestion (Azure Monitor / AWS CloudWatch) and document successful log flow. Evidence examples: screenshot of AV console showing "up-to-date" signatures, exported weekly scan logs, SIEM alert exports showing a detected file hash, incident ticket with containment steps. Define RTO/RPO expectations for malware incidents relevant to your contract obligations under FAR.

Verification, testing, and routine maintenance

Create checklist checks that run on a schedule: daily signature update verification, weekly full-device scan, monthly patch compliance report, quarterly simulated phishing, and annual tabletop exercises for malware incidents. Automation helps: use a patch management tool or scripts (PowerShell for Windows Update, apt-get unattended-upgrades for Debian/Ubuntu) and schedule scans via cron or Windows Task Scheduler. Include a “proof of testing” field in the checklist to attach logs or screenshots demonstrating the task was completed and the result.

Cost-conscious options and small-business scenarios

For small businesses with limited budget, leverage built-in protections: Microsoft Defender (part of Windows 10/11), native macOS protections, and open-source utilities (ClamAV, rkhunter). Use cloud email filtering from your provider (Office 365 Advanced Threat Protection or Google Workspace security settings) to block malicious attachments and malicious URLs. If you cannot deploy full EDR, increase the frequency of scans, enforce strict application allowlisting via AppLocker or Linux package management + file-system permissions, and require multi-factor authentication for remote access—document why these mitigations meet the level of risk acceptable under the Compliance Framework.

Risks of not implementing the requirement and compliance consequences

Failing to implement protections against malicious code increases the risk of data exfiltration, ransomware, supply‑chain compromise, and service outages. Contractually, noncompliance with FAR 52.204-21 can lead to penalties, loss of contracts, or being flagged in future procurements; under CMMC grading, it can block progress toward necessary certification. From a technical perspective, inadequate controls make incident containment slower and forensic investigation more difficult, increasing recovery costs and reputational damage.

Summary: Build your checklist around inventory, preventive controls (AV/EDR, allowlisting, email/web filtering), detection and logging, scheduled verification and testing, documentation and evidence, and defined response actions; use low-cost native tools if needed, automate checks, and assign owners and frequencies to each item to meet FAR 52.204-21 and CMMC SI.L1-B.1.XIII requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes