🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Practical SI.L1-B.1.XV Compliance Checklist: Periodic Scans and Real-Time External File Inspection for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV

Step‑by‑step guidance and a practical checklist to implement SI.L1-B.1.XV: periodic scans and real‑time external file inspection required for FAR 52.204-21 / CMMC 2.0 Level 1 compliance.

April 16, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to design and implement a practical SI.L1-B.1.XV compliance checklist for the Compliance Framework practice "Periodic Scans and Real-Time External File Inspection" to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 expectations—covering scope, required controls, concrete technical settings, small-business examples, and an actionable checklist you can use immediately.

Implementation overview in Compliance Framework context

Within the Compliance Framework, SI.L1-B.1.XV focuses on detecting and blocking malicious content that enters your environment via external files (email attachments, web downloads, cloud uploads, removable media). Key objectives are: (1) perform scheduled, system-wide scans to find latent malware or suspicious files; (2) provide inline or near‑real‑time inspection at ingestion points so malicious files do not execute or propagate; and (3) retain evidence and alerts for audit and incident response. Implementation notes: define the scope of "external files", maintain an asset inventory, specify roles (who reviews alerts, who quarantines), and document tool configurations and retention policies.

Periodic scans: frequency, scope, and configuration

Periodic scans are your safety net for files that slip past real‑time protections or arrive on offline media. Recommended practical settings: schedule full endpoint/file‑share scans weekly and incremental scans daily; run a full repository scan (e.g., file server, cloud buckets) monthly; update signatures and engine definitions at least every 6–12 hours (or use real‑time cloud feeds). Technical specifics: enable recursive scanning, set a default timeout per file (e.g., 120s for sandbox analysis), exclude known benign directories by hash whitelisting, and log scan start/finish times and counts of infected/quarantined files to your SIEM. Example command (Linux with ClamAV): clamscan --recursive --infected --log=/var/log/clamav/scan.log /srv/files

Real‑time external file inspection: design patterns and integration points

Real‑time inspection should be inline or near‑inline at the point of ingestion: email gateways (SMTP/MTA with sandboxing), web upload proxies, cloud storage event triggers (S3 events), and endpoint file system drivers/EDR. Practical options: enable Exchange/Office 365 Safe Attachments or Google Workspace attachment scanning, deploy an inline proxy that performs MIME type/extension checks and forwards suspicious files to a sandbox (e.g., Cuckoo, commercial sandboxes), and implement cloud functions (AWS Lambda, Azure Functions) to scan objects on upload and quarantine or tag them. Configure maximum inline file size (e.g., 10–25 MB) for synchronous scans; larger files should be placed in quarantine and scanned async. Maintain metadata (file hash, source IP/user, detection name) in logs for later correlation.

Small‑business real‑world examples and practical setups

Example 1 — Microsoft 365 small business: enable Microsoft Defender for Office 365 Safe Attachments, turn on real‑time endpoint protection via Microsoft Defender for Business, and schedule weekly Defender offline scans for servers and file shares. Evidence: screenshots of policy configuration, weekly scan reports saved to a secure share, and alert emails forwarded to the security owner. Example 2 — low‑cost on‑premises setup: deploy ClamAV or Sophos Home on Windows file servers, use inotify/incron on a Linux SMB mount to trigger clamscan on new files, and send scan results to a lightweight SIEM like Wazuh/Elastic for retention and alerting.

Cloud‑native scanning example (AWS) and technical patterns

Example 3 — AWS S3 + Lambda scanning: configure an S3 PUT event to trigger a Lambda that downloads the object, computes SHA256, checks a hash whitelist (for allowed vendor files), and runs ClamAV or an AV engine containerized (Lambda layers or ECR). If malicious, move the object to a quarantine bucket and create a CloudWatch/SNS incident with metadata (bucket, key, uploader IAM user, hash, detection name). Set Lambda timeout to 3–5 minutes, memory to 1024–2048 MB for scanning, and log to CloudWatch with retention 90 days. For large objects (>50 MB), route uploads to a pre‑signed URL that streams to a holding area and triggers async scanning before making the file available to users.

Practical checklist and evidence items for SI.L1-B.1.XV

Use this checklist to prove compliance; capture artifacts for each item. Checklist items:

  • Define scope and policy: documented policy naming SI.L1-B.1.XV responsibilities and sources of external files (artifact: policy doc, versioned).
  • Asset inventory: list of systems and ingestion points (artifact: asset spreadsheet).
  • Periodic scan schedule: cron/agent schedule and reports (artifact: scan logs and weekly/monthly reports).
  • Real‑time scanning enabled: configuration for email gateway, proxy, cloud functions, EDR (artifact: screenshots/config exports).
  • Quarantine and remediation process: documented workflow and role assignments (artifact: runbook).
  • Logging and retention: SIEM events with hashes and detection names retained per policy (artifact: SIEM query results, retention config).
  • Signature/update cadence: proof of engine updates (artifact: update logs or console reports).
  • Testing and false‑positive handling: test files (EICAR) scanning results and incident tickets (artifact: test logs, ticket IDs).
  • Evidence of training and awareness: who reviews alerts and how (artifact: training logs).

Risks of not implementing SI.L1-B.1.XV correctly

Failing to scan external files periodically and inspect them in real time increases the risk of malware execution, lateral movement, and supply‑chain compromise. For contractors handling Federal Contract Information (FCI), this can result in contract penalties, requirement to report incidents under applicable clauses, loss of trust, and costly breach remediation. Operational impacts include ransomware propagation across file shares, data exfiltration via infected attachments, and cleanup costs that exceed the investment in basic scanning and sandboxing tools.

Summary: implement SI.L1-B.1.XV by scoping ingestion points, enabling real‑time inspection where possible, scheduling frequent periodic scans, and documenting configurations and evidence for audit. Start with low-friction, cost-effective options (cloud native scanning, Microsoft/Google managed services, or open‑source agents) and iterate: tune exclusions, retain logs, test with known‑good and known‑bad samples, and maintain a clear quarantine and incident response workflow to meet FAR 52.204-21 and CMMC 2.0 Level 1 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes