🚨 CMMC Phase One started November 10! Here's everything you need to know →

Practical Implementation Checklist: Protecting Systems from Malicious Code to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII

Step-by-step checklist and technical controls to protect contractor systems from malicious code and satisfy FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII.

•
April 06, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a concise, actionable implementation checklist to protect systems from malicious code—mapping practical controls and configuration steps to help small businesses meet the Compliance Framework requirements in FAR 52.204-21 and CMMC 2.0 Level 1 Control SI.L1-B.1.XIII.

Why malicious code protection matters for Compliance Framework

FAR 52.204-21 and the CMMC Level 1 baseline require basic safeguarding of contractor systems that process government information; protecting against malicious code is foundational because malware is a primary vector for data loss, ransomware, lateral movement, and supply-chain compromise. For small contractors with limited IT staff, a documented, repeatable malware protection program reduces risk, evidences due care, and supports contract eligibility.

Practical implementation checklist (Compliance Framework)

1) Inventory and scope: know what you must protect

Begin by identifying all endpoints, servers, cloud workloads, mobile devices, and removable media that process controlled or contract-related information (CUI). Use simple tools like network scans (Nmap), asset inventories (GLPI, OCS), or cloud provider asset lists. Document operating systems, application stacks, and admin accounts—this inventory drives where malware defenses must be applied and helps prove scope for audits.

2) Deploy and centrally manage anti-malware/EDR

Install a supported anti-malware agent on every Windows, macOS, and Linux endpoint. For small organizations, Microsoft Defender for Business (or Defender for Endpoint with centralized management) is cost-effective; alternatives include CrowdStrike, SentinelOne, or Sophos. Configure: real-time protection enabled, cloud-delivered protection, tamper protection turned on, automatic signature/definition updates (hourly or as provided), and scheduled scans (daily quick scans, weekly full scans). Centralize alerts to an admin console and retain telemetry for at least the period required by your compliance policy.

3) Apply application control and least privilege

Where possible implement application allowlisting (AppLocker or Windows Defender Application Control on Windows; signed package / SELinux policy for Linux). Limit administrative privileges—use separate admin accounts and avoid running day-to-day users as local admins. Configure Group Policy to prevent execution from common abuse locations (e.g., %AppData%, %Temp%), and restrict PowerShell/Script execution policy where appropriate.

4) Email and web gateway protections

Implement email protections to block malicious attachments and links: enable SPF/DKIM/DMARC, use a secure email gateway (Proofpoint, Mimecast, Office 365 ATP) with attachment sandboxing and URL rewriting. Deploy web filtering or DNS filtering (e.g., Cisco Umbrella, Quad9) to block known malicious domains. These measures reduce drive-by downloads and phishing-delivered malware—common infection vectors for small businesses.

5) Removable media controls and backup strategy

Disable or tightly control USB/mountable media via Group Policy or endpoint controls; consider device inventory and explicit allow/deny lists. Maintain immutable, off-network backups of critical data and test restores regularly—offline snapshots and cloud backup versions help recover from ransomware if prevention fails. Keep at least one offline copy and document backup retention and restoration procedures for audit purposes.

6) Logging, detection, and incident response

Collect and retain endpoint and server logs to detect malware activity: Windows Event IDs (e.g., 4688 process creation, 7045 service install), Sysmon event IDs (1 process create, 3 network connection, 11 file creation), and antivirus event logs. Forward logs to a lightweight SIEM or cloud log service (Microsoft Sentinel, Splunk, or an affordable alternative) for alerting. Create a simple Incident Response playbook with containment steps (isolate endpoint, preserve forensic images, notify stakeholders) and run a tabletop at least annually.

7) Patching, configuration management, and validation

Keep operating systems and applications patched—establish a monthly or biweekly patch cycle and emergency patch process for critical vulnerabilities. Harden operating system configurations via CIS Benchmarks or vendor-recommended baselines and document deviations. Validate controls with periodic scan/audit: run internal antivirus signature and EDR health checks, perform periodic malware simulation exercises (non-destructive phishing tests or AM cache probes) and document results.

Real-world small business scenarios

Example A: A 15-person contractor using Office 365 and three Windows servers can enable Microsoft Defender for Business, configure Defender policies in the Microsoft 365 admin center, enforce MFA, apply Intune device configuration to disable execution from %AppData% and enable BitLocker, and use Exchange Online Protection to sandbox attachments—implementable within a week by an MSP. Example B: A small Linux-hosted web application should run ClamAV or commercial EDR for Linux, schedule daily freshclam updates and daily scans (clamscan -r --infected /var/www), protect SSH with key-based auth, limit sudoers, and backup databases to an off-site vault with tested restores.

Risks and compliance impact if left unimplemented

Failure to implement these controls increases risks of data exfiltration, ransomware, and system compromise that can lead to contract loss, mandatory breach notifications, and financial penalties. From a compliance perspective, auditors will view missing anti-malware controls, lack of patching, absent logging, or no IR playbook as gaps that can prevent contract award or continuation—particularly when protecting CUI under FAR and CMMC rules.

Summary: Protecting systems from malicious code to meet Compliance Framework requirements is achievable for small businesses by following a prioritized checklist—inventory assets, deploy centrally managed anti-malware/EDR, enforce least privilege and application control, secure email/web gateways, control removable media, maintain tested backups, capture logs, and run simple incident response procedures. Document each step, measure effectiveness, and review periodically to demonstrate continuous compliance with FAR 52.204-21 and CMMC 2.0 Level 1 - SI.L1-B.1.XIII.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes