Small businesses that handle federal contract information must meet FAR 52.204-21 and the equivalent CMMC 2.0 Level 1 control SI.L1-B.1.XIII, which requires basic malicious code protections β this post gives pragmatic, cost-effective implementation steps, concrete tools, a realistic timeline (0β90 days), and templates you can adapt to demonstrate compliance to auditors.
What SI.L1-B.1.XIII / FAR 52.204-21 requires (practical interpretation)
At Level 1, SI.L1-B.1.XIII expects you to protect systems that store, process, or transmit Covered Contractor Information (CCI) against malicious code through baseline anti-malware/anti-spyware protections, timely updates, and routine scans. For small businesses using the Compliance Framework, treat this as a set of minimum technical safeguards: endpoint protection enabled with real-time scanning, automated signature/definition updates, basic email/file scanning controls, and simple detection/response steps. Documented policies and operational evidence (logs, scan results, update records) are necessary to show you executed these controls.
Cost-effective tools and configurations (what to buy or enable)
Leverage built-in platform protections before buying premium tools: Microsoft Defender for Business (included or low-cost with Microsoft 365 Business), built-in macOS XProtect + Malware Removal Tool, and reputable free/low-cost options (Malwarebytes for Business, Sophos Home/Intercept X Essentials, CrowdStrike Falcon (small org pricing), or open-source ClamAV for Linux servers). Complement endpoint protection with an email gateway that blocks known-malicious attachments (Google Workspace/Gmail or Microsoft Defender for Office 365). Use centralized management (Microsoft Intune, Google Workspace device management, or a low-cost RMM) to enforce policy and produce audit logs. Cost-saving tip: enable Windows Defender full-featured protection and use Intuneβs basic MDM policies for centralization instead of standalone EDR for very small teams.
Windows-specific practical steps
For Windows endpoints, enable Windows Defender real-time protection, cloud-delivered protection, and automatic sample submission. Example PowerShell commands to verify and enable core features (run as admin): "Set-MpPreference -DisableRealtimeMonitoring $false", "Set-MpPreference -DisableAutoExclusions $false", "Add-MpPreference -ExclusionPath 'C:\\SomePath\\'". Force update signatures with "Update-MpSignature". Use Intune to push Defender configuration profiles (attack surface reduction rules, controlled folder access) and schedule weekly full scans. Maintain a device inventory via Azure AD/Intune so you can show you applied the settings across all managed machines.
Linux and macOS practical steps
On Linux servers, deploy ClamAV with freshclam configured as a cron or systemd timer and integrate periodic scans into monitoring (add scan output to a simple log ingestor). For macOS, ensure Gatekeeper/XProtect and automatic system updates are enabled; consider Malwarebytes for macOS to supplement built-in detection. For all OSes, enforce automatic OS updates where possible, restrict privilege escalation (no persistent admin accounts for daily use), and use application allowlisting where feasible (AppLocker on Windows, MDM-based app control on macOS). Store scan and update logs centrallyβuse a lightweight log collector (Fluentd/CloudWatch/Log Analytics) or export Defender logs for evidence.
Timelines and a realistic 0β90 day project plan
Day 0β7: Inventory and gap analysis β identify all endpoints, servers, email systems, and where CCI resides; map to the Compliance Framework control SI.L1-B.1.XIII. Day 8β21: Policy and tool selection β adopt a one-page Malicious Code Protection Policy (template below), pick tools (e.g., Defender + Intune or Defender + Malwarebytes), and set up centralized management. Day 22β45: Deployment β roll out endpoint agents and email protections in staged waves (pilot 5β10 machines, then expand), enable auto-updates and scheduled scans, and configure logging. Day 46β75: Evidence collection and refinement β consolidate logs, run full scans, resolve detections, and document remediation steps; create POA&M entries for any gaps. Day 76β90: Audit-ready packaging β assemble policy, configuration screenshots, agent deployment reports, scan logs, and an incident playbook; perform a tabletop to validate response steps. This timeline is achievable for a 5β50 person company using internal resources and a single MSP if needed.
Templates, documentation, and evidence you should produce
Key artifacts auditors expect: 1) Malicious Code Protection Policy (one page: scope, roles, update cadence, exception process), 2) Configuration Baseline Checklist (showing Defender/agent settings, scheduled scan cadence, update configs), 3) Deployment Report (agent install counts and dates), 4) Weekly/Monthly Scan and Update Logs (or export from central console), 5) POA&M for unresolved items with target dates, and 6) Incident Response mini-playbook for a single infected endpoint (isolate, collect forensic snapshot, remediate, restore from backup). A minimal policy sentence example: "All endpoints processing CCI must run an approved anti-malware agent with real-time protection and auto-signature updates enabled; deviations require documented exception and compensating controls." Store these docs in a versioned repository (SharePoint, Git, or encrypted cloud folder) and retain them for at least one contract cycle.
Risks of not implementing SI.L1-B.1.XIII and compliance tips
Failing to implement these protections increases risk of ransomware, data exfiltration of CCI, loss of contracts, and penalties under FAR; a single infected endpoint can enable lateral movement into sensitive project data. Compliance tips: document everything (deployment dates, exceptions, remediation actions), use least privilege, enforce MFA on admin accounts, back up CCI with immutable backups and test restores quarterly, and treat evidence collection as part of operations (automate log exports). Small businesses often avoid audits by demonstrating consistent, repeatable controls rather than perfect technology β the auditor wants proof you applied and maintained basic safeguards.
Summary: For small businesses, meeting FAR 52.204-21 / CMMC 2.0 Level 1 malicious-code protections is practical and affordable if you leverage built-in OS protections, centralize management (Intune/Google Workspace), enforce auto-updates and scheduled scans, and produce a short set of audit artifacts (policy, baseline, deployment reports, logs, and a mini incident playbook). With a 0β90 day plan, basic tooling, and simple templates you can cost-effectively reduce risk and demonstrate compliance to contracting officers and assessors.