{
  "title": "How to Build a Practical Checklist to Protect Against Malicious Code: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII",
  "date": "2026-04-08",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-build-a-practical-checklist-to-protect-against-malicious-code-far-52204-21-cmmc-20-level-1-control-sil1-b1xiii.jpg",
  "content": {
    "full_html": "<p>Protecting an organization — especially a small business contractor handling controlled information — from malicious code is a practical, evidence-driven task: FAR 52.204‑21 and CMMC 2.0 Level 1 require demonstrable actions to prevent, detect, and respond to malware and other unwanted code. This post gives a focused, implementable checklist you can use to meet SI.L1-B.1.XIII expectations, with technical settings, real-world small-business examples, and compliance tips you can produce for an assessor.</p>\n\n<h2>Why this control matters and the real risk of not implementing it</h2>\n<p>Malicious code (viruses, trojans, ransomware, script-based malware, etc.) is the most common initial vector for data theft, service disruption, and supply-chain compromise — risks that directly affect contracts covered by FAR 52.204‑21. For a small contractor, a single successful ransomware event can halt project delivery, leak CUI, and lead to contract termination or fines. Noncompliance also leaves you without documented defenses during incident response and may prevent winning or retaining government work. The goal of a checklist is to make defenses consistent, repeatable, and auditable.</p>\n\n<h2>Core checklist categories to include (practical implementation)</h2>\n<p>A useful checklist should be short, actionable, and evidence-oriented. At minimum include these categories: 1) Asset Inventory & Baseline, 2) Preventive Controls, 3) Detection & Monitoring, 4) Response & Recovery, and 5) Documentation & Evidence. Each category below includes specific items and implementation notes tailored to a Compliance Framework environment.</p>\n\n<h3>Inventory & baseline</h3>\n<p>Checklist items: maintain an up‑to‑date hardware/software inventory; classify systems that process or store CUI; document OS versions and patch level. Implementation notes: use an automated discovery tool (e.g., a simple Nmap/SoftPerfect Inventory or cloud provider inventory) or a spreadsheet tied to AD/Intune records. For each system record: hostname, owner, OS build, AV/EDR agent version, last patch date, and network zone. Evidence for assessors: export of inventory, screenshot of management console, date-stamped CSV. Without inventory you cannot ensure coverage of preventive controls.</p>\n\n<h3>Preventive controls — hardening and endpoint protection</h3>\n<p>Checklist items: deploy centrally managed anti‑malware/EDR agents on all endpoints and servers; enable real‑time scanning; configure automatic signature/definition updates at least daily; enable application control where feasible; restrict local admin rights; block or control removable media. Implementation notes: for Windows, use Microsoft Defender with centralized onboarding (Intune/Group Policy) and enable Attack Surface Reduction rules; for cross-platform consider a managed EDR (CrowdStrike, SentinelOne, or similar) if budget allows. Technical examples: enable real‑time protection and automatic updates via GPO or Intune, and set scheduled full system scans weekly and quick scans daily; use MpCmdRun.exe -SignatureUpdate on Windows Defender to force updates during testing. Evidence: management console screenshots showing policy applied, agent version report, scheduled scan logs.</p>\n\n<h3>Detection & monitoring</h3>\n<p>Checklist items: enable logging of AV/EDR detections, forward critical events to a central log store or SIEM (or a simple log aggregation for small shops), monitor email and web gateway alerts, and enable basic host-based auditing (process creation logging). Implementation notes: configure agents to send alerts to an admin email or webhook; keep detection logs for a minimum period consistent with contract requirements (e.g., 90 days). Technical detail: on Windows enable Sysmon for detailed process/driver/network logging and forward events via NXLog/Winlogbeat to a central collector; configure EDR to log process tree and file hashes for detections. Evidence: alert runbooks, exported detection logs for a sample incident, retention policy document.</p>\n\n<h3>Response & recovery</h3>\n<p>Checklist items: have an incident playbook for malware events, isolated network segments to contain infected hosts, documented backup and restore procedures with offline or immutable backups, and a communication plan for reporting incidents to stakeholders and contracting officers. Implementation notes: test the playbook quarterly with tabletop exercises; validate backups by performing periodic restore drills. Example scenario: a small engineering firm receives a detection of file‑encrypting behavior — the checklist-driven response is: (1) isolate host via NAC or switch port disable, (2) gather EDR artifacts and hashes, (3) restore files from last known good backup, (4) update patch/AV policies, and (5) log the incident in the register. Evidence: dated exercise reports, backup restore logs, and completed incident forms.</p>\n\n<h2>Compliance evidence, mapping, and small-business scenarios</h2>\n<p>For FAR 52.204‑21 and CMMC Level 1 you must show both the controls and artifacts. Practical artifacts include: policy documents (malware policy, removable media policy), screenshots from AV/EDR consoles showing policy enforcement, inventory exports, scheduled-scan logs, example detection alerts with investigator notes, and a signed self-assessment mapping each checklist item to the CMMC practice SI.L1-B.1.XIII. Small-business example: a 25-person contractor used Windows Defender with Intune, enabled Defender ATP features, kept a central CSV inventory, and produced monthly reports showing 100% agent coverage and daily signature updates — that documentation satisfied the assessor in their self-attestation for FAR compliance.</p>\n\n<h2>Tips, best practices, and low‑cost options</h2>\n<p>Compliance tips: (1) Start with native platform features — Windows Defender + Intune + Azure AD provide a low-cost path to meet many requirements; (2) automate evidence collection — scheduled exports and screenshots reduce audit prep time; (3) enforce least privilege and block macros from the internet to reduce infection vectors; (4) document exceptions and compensating controls; (5) schedule quarterly checks of the checklist itself. For small budgets, free tools plus a disciplined process (inventory CSVs, Defender logs, Sysmon config, and a lightweight log collector) often meet Level 1 expectations — but ensure the artifacts show someone reviewed and acted on detections.</p>\n\n<p>In summary, build a concise checklist that covers inventory, prevention, detection, response, and evidence collection; implement the technical settings (real‑time scanning, automatic updates, centralized agent management, logging) and test them via exercises and restores. By documenting these steps and keeping dated artifacts you create a repeatable, auditable process that satisfies FAR 52.204‑21 / CMMC 2.0 Level 1 expectations and materially reduces the risk of malicious code to your organization.</p>",
    "plain_text": "Protecting an organization — especially a small business contractor handling controlled information — from malicious code is a practical, evidence-driven task: FAR 52.204‑21 and CMMC 2.0 Level 1 require demonstrable actions to prevent, detect, and respond to malware and other unwanted code. This post gives a focused, implementable checklist you can use to meet SI.L1-B.1.XIII expectations, with technical settings, real-world small-business examples, and compliance tips you can produce for an assessor.\n\nWhy this control matters and the real risk of not implementing it\nMalicious code (viruses, trojans, ransomware, script-based malware, etc.) is the most common initial vector for data theft, service disruption, and supply-chain compromise — risks that directly affect contracts covered by FAR 52.204‑21. For a small contractor, a single successful ransomware event can halt project delivery, leak CUI, and lead to contract termination or fines. Noncompliance also leaves you without documented defenses during incident response and may prevent winning or retaining government work. The goal of a checklist is to make defenses consistent, repeatable, and auditable.\n\nCore checklist categories to include (practical implementation)\nA useful checklist should be short, actionable, and evidence-oriented. At minimum include these categories: 1) Asset Inventory & Baseline, 2) Preventive Controls, 3) Detection & Monitoring, 4) Response & Recovery, and 5) Documentation & Evidence. Each category below includes specific items and implementation notes tailored to a Compliance Framework environment.\n\nInventory & baseline\nChecklist items: maintain an up‑to‑date hardware/software inventory; classify systems that process or store CUI; document OS versions and patch level. Implementation notes: use an automated discovery tool (e.g., a simple Nmap/SoftPerfect Inventory or cloud provider inventory) or a spreadsheet tied to AD/Intune records. For each system record: hostname, owner, OS build, AV/EDR agent version, last patch date, and network zone. Evidence for assessors: export of inventory, screenshot of management console, date-stamped CSV. Without inventory you cannot ensure coverage of preventive controls.\n\nPreventive controls — hardening and endpoint protection\nChecklist items: deploy centrally managed anti‑malware/EDR agents on all endpoints and servers; enable real‑time scanning; configure automatic signature/definition updates at least daily; enable application control where feasible; restrict local admin rights; block or control removable media. Implementation notes: for Windows, use Microsoft Defender with centralized onboarding (Intune/Group Policy) and enable Attack Surface Reduction rules; for cross-platform consider a managed EDR (CrowdStrike, SentinelOne, or similar) if budget allows. Technical examples: enable real‑time protection and automatic updates via GPO or Intune, and set scheduled full system scans weekly and quick scans daily; use MpCmdRun.exe -SignatureUpdate on Windows Defender to force updates during testing. Evidence: management console screenshots showing policy applied, agent version report, scheduled scan logs.\n\nDetection & monitoring\nChecklist items: enable logging of AV/EDR detections, forward critical events to a central log store or SIEM (or a simple log aggregation for small shops), monitor email and web gateway alerts, and enable basic host-based auditing (process creation logging). Implementation notes: configure agents to send alerts to an admin email or webhook; keep detection logs for a minimum period consistent with contract requirements (e.g., 90 days). Technical detail: on Windows enable Sysmon for detailed process/driver/network logging and forward events via NXLog/Winlogbeat to a central collector; configure EDR to log process tree and file hashes for detections. Evidence: alert runbooks, exported detection logs for a sample incident, retention policy document.\n\nResponse & recovery\nChecklist items: have an incident playbook for malware events, isolated network segments to contain infected hosts, documented backup and restore procedures with offline or immutable backups, and a communication plan for reporting incidents to stakeholders and contracting officers. Implementation notes: test the playbook quarterly with tabletop exercises; validate backups by performing periodic restore drills. Example scenario: a small engineering firm receives a detection of file‑encrypting behavior — the checklist-driven response is: (1) isolate host via NAC or switch port disable, (2) gather EDR artifacts and hashes, (3) restore files from last known good backup, (4) update patch/AV policies, and (5) log the incident in the register. Evidence: dated exercise reports, backup restore logs, and completed incident forms.\n\nCompliance evidence, mapping, and small-business scenarios\nFor FAR 52.204‑21 and CMMC Level 1 you must show both the controls and artifacts. Practical artifacts include: policy documents (malware policy, removable media policy), screenshots from AV/EDR consoles showing policy enforcement, inventory exports, scheduled-scan logs, example detection alerts with investigator notes, and a signed self-assessment mapping each checklist item to the CMMC practice SI.L1-B.1.XIII. Small-business example: a 25-person contractor used Windows Defender with Intune, enabled Defender ATP features, kept a central CSV inventory, and produced monthly reports showing 100% agent coverage and daily signature updates — that documentation satisfied the assessor in their self-attestation for FAR compliance.\n\nTips, best practices, and low‑cost options\nCompliance tips: (1) Start with native platform features — Windows Defender + Intune + Azure AD provide a low-cost path to meet many requirements; (2) automate evidence collection — scheduled exports and screenshots reduce audit prep time; (3) enforce least privilege and block macros from the internet to reduce infection vectors; (4) document exceptions and compensating controls; (5) schedule quarterly checks of the checklist itself. For small budgets, free tools plus a disciplined process (inventory CSVs, Defender logs, Sysmon config, and a lightweight log collector) often meet Level 1 expectations — but ensure the artifacts show someone reviewed and acted on detections.\n\nIn summary, build a concise checklist that covers inventory, prevention, detection, response, and evidence collection; implement the technical settings (real‑time scanning, automatic updates, centralized agent management, logging) and test them via exercises and restores. By documenting these steps and keeping dated artifacts you create a repeatable, auditable process that satisfies FAR 52.204‑21 / CMMC 2.0 Level 1 expectations and materially reduces the risk of malicious code to your organization."
  },
  "metadata": {
    "description": "Step‑by‑step guidance and a pragmatic checklist to meet FAR 52.204‑21 / CMMC 2.0 Level 1 requirements for protecting systems against malicious code in small business environments.",
    "permalink": "/how-to-build-a-practical-checklist-to-protect-against-malicious-code-far-52204-21-cmmc-20-level-1-control-sil1-b1xiii.json",
    "categories": [],
    "tags": []
  }
}