🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prioritize and Implement Cost-Effective Malware Protections for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII: A Practical Checklist

Practical, cost-conscious checklist and implementation guidance to meet the malware-protection expectations of FAR 52.204-21 and CMMC 2.0 Level 1 (SI.L1-B.1.XIII) for small businesses.

•
April 01, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting the malware protection requirements mapped to FAR 52.204-21 and CMMC 2.0 Level 1 (Control SI.L1-B.1.XIII) doesn't require expensive enterprise tooling — it requires prioritized, documented, and consistently applied controls that reduce risk to CUI and business operations; this post gives a practical, cost-effective checklist and real-world examples a small business can implement today.

What SI.L1-B.1.XIII means in practical terms (and the risk of not doing it)

At Level 1 the SI.L1-B.1.XIII expectation is straightforward: implement reasonable malware protections to detect, prevent, and limit the impact of malware on systems that process, store, or transmit Controlled Unclassified Information (CUI) or government-related data. For small businesses that typically means real-time anti-malware, automated signature and engine updates, basic host protections, and operational processes for detection and response. The risk of not implementing these protections includes ransomware locking critical files, data exfiltration of sensitive contract data, failed audits / contract loss, and reputational damage — all of which are disproportionately costly for SMBs.

Key objectives and scope for small organizations

Key objectives you should document and prove to an auditor/assessor: (1) Inventory of assets that store/process CUI, (2) Real-time anti-malware enabled and kept up-to-date on those assets, (3) Processes for scanning removable media and email attachments, (4) A simple incident response path for malware detections, and (5) Evidence artifacts (policies, config screenshots, logs, training). Scope your effort by prioritizing the smallest set of systems that handle CUI — often a handful of desktop/laptop workstations and a server — then apply the checklist to those first.

Cost-effective step-by-step implementation checklist

1) Asset inventory & prioritization: create a short spreadsheet listing devices, OS, purpose, and whether they handle CUI. Example: "Contracts-Laptop-01 (Windows 11) — handles proposals/CUI" — prioritize these for full protection first. This helps you focus limited budget on the highest-value targets and simplifies evidence collection.

2) Deploy host protection: use built-in, no/low-cost tools where appropriate. For Windows-based workstations and servers, enable Microsoft Defender features (real-time protection, tamper protection, cloud-delivered protection). Example PowerShell commands to harden Defender on managed endpoints: Set-MpPreference -DisableRealtimeMonitoring $false; Set-MpPreference -DisableArchiveScanning $false; Add-MpPreference -ExclusionPath "C:\Dev\Temp" (use exclusions sparingly). For macOS, enable XProtect and Gatekeeper and deploy a lightweight commercial AV if needed. If you cannot centrally manage EDR, at minimum enforce automatic signature and OS updates and schedule weekly full scans.

3) Email and web-layer protections: block malicious attachments and URLs before they reach users — this is often more cost-effective than buying advanced endpoint suites. Implement vendor-provided anti-spam with attachment sandboxing (cloud email like Microsoft 365 Defender or Google Workspace security settings), and enable DNS filtering (OpenDNS/Cloudflare Gateway) to block known-bad domains. Real-world example: a small 12-person contractor saved ~$12k/year by enabling Microsoft Defender for Office 365 P1 features included in their Microsoft 365 Business Premium license and restricting macros in Office files received via email.

4) Hardening and ancillary controls: reduce attack surface with least-privilege accounts (no local admin for standard users), disable autorun for removable drives, block or scan macro-enabled Office files, and keep devices patched. Use Group Policy or MDM (Intune, Jamf) to push settings like disabling Office macros from the internet and enforcing Windows Update rings. Small shops without a full-time admin can use cloud-based MDM + Defender for Endpoint or a managed SOC-as-a-service for continuous monitoring at predictable monthly costs.

5) Monitoring, logging, and response: configure endpoints to forward malware alerts to a centralized location (SIEM or even a simple log aggregation tool). Maintain a short incident response playbook: isolation steps (disconnect from network), who to notify (internal + government contracting officer if required), and how to collect evidence (preserve logs, take disk images if needed). Evidence for compliance should include: AV console screenshots, timestamped detection logs, update history (signature and OS patch), a copy of the incident playbook, and training completion records for staff.

Practical compliance tips and best practices

Document decisions and trade-offs: why you chose a particular AV product, why certain systems are out of scope, and how you test protections. Implement basic quarterly validation: run a harmless EICAR test file on prioritized devices to confirm detections, verify automatic updates, and review blocked/malicious email quarantine reports. Maintain a simple change log (who changed a setting, when) to demonstrate control over configurations. For cost control, consider leveraging included security features in existing SaaS licenses before buying new tools.

Summary: Meeting SI.L1-B.1.XIII for FAR 52.204-21 / CMMC 2.0 Level 1 is achievable for small businesses by prioritizing CUI-bearing assets, enabling and documenting built-in anti-malware and hardening features, adding email/web filtering, instituting a lightweight monitoring and response process, and keeping clear evidence of configuration and testing. Start with an asset-focused checklist, use low-cost or included vendor features, and document everything — that combination reduces both risk and audit friction while staying budget-friendly.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes