🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a SI.L1-B.1.XIII Compliance Checklist: Implementing FAR 52.204-21 / CMMC 2.0 Level 1 Malicious Code Protections

Step-by-step guidance to implement SI.L1-B.1.XIII malicious code protections that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 requirements for small businesses.

•
April 07, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing SI.L1-B.1.XIII — malicious code protections — is a practical, high-impact way to meet the basic safeguarding requirements of FAR 52.204-21 and the mapping under CMMC 2.0 Level 1; this post gives a Compliance Framework–specific checklist, technical controls, and small-business examples so you can deploy measurable protections today.

What SI.L1-B.1.XIII requires (context and objectives)

Under the Compliance Framework, SI.L1-B.1.XIII focuses on preventing, detecting, and responding to malicious code on information systems that process federal contract information (FCI). Key objectives: ensure anti-malware/anti-exploit controls are deployed on endpoints and servers, keep signatures and engines current, enable real-time detection, integrate detection with logging/alerting, and tie protections into incident response. Practically, this maps to FAR 52.204-21 basic safeguarding expectations and CMMC Level 1's minimal technical controls.

Step-by-step implementation checklist (practical actions)

Start by creating an inventory of all systems in scope (Windows desktops/laptops, macOS, Linux servers, cloud VMs, mobile devices). For each asset class identify the protection method (endpoint AV/EDR, mail/web gateway scanning, container/VM agents). Required checklist items you should implement and verify:

- Inventory completed and categorized by criticality and FCI exposure. - Anti-malware installed on all managed endpoints and servers. - Real-time protection enabled and configured to block, not just detect. - Automatic signature/engine updates enabled (at least daily; cloud-delivered protection enabled where supported). - Scheduled full scans weekly and daily quick scans. - Email attachment scanning and URL link protection on the gateway. - Application allowlisting or execution controls for admin systems. - Removable media controls (block or scan USB devices). - Centralized logging of alerts to a SIEM or log collector with alerting configured.

Technical configuration examples

Use concrete, small-business-friendly configurations: for Windows 10/11 use Microsoft Defender for Business with Tamper Protection on, Cloud-delivered protection enabled, Real-time protection on, and automatic sample submission turned on; configure Intune or Group Policy to enforce these settings. On Linux servers, run an on-access scanner (e.g., CrowdStrike/Falcon or ClamAV for basic scanning) and enable file integrity checking with AIDE and rkhunter. For macOS, enable Gatekeeper and use a managed AV agent. Email: enable Office 365 Defender or a third-party gateway (Mimecast/Proofpoint) to block executable attachments and strip macros; enable ATP link protection to rewrite and scan URLs.

Logging, monitoring, and incident response integration

Malicious code controls are only effective if detections turn into action. Forward antivirus/EDR alerts to a central collector (Azure Sentinel, Splunk Light, or a managed SOC) with automated alerting for high-severity detections. Define playbooks: e.g., upon ransomware detection, automatically isolate the endpoint from the network, snapshot the VM if applicable, and notify the incident response lead. Retain logs for at least 90 days as a practical baseline for investigations and audit evidence (document retention in your Compliance Framework policies).

Small-business scenarios and real-world examples

Scenario A — 25-person subcontractor with limited budget: use Microsoft Defender for Business (included in many Microsoft 365 bundles) for endpoint protection, enable Defender for Office 365 for email scanning, enforce device compliance via Intune, and configure centralized alerts to a single security admin. Scenario B — 8-person developer shop hosting code on cloud VMs: install an EDR agent (lightweight like CrowdStrike or SentinelOne), turn on cloud workload protection for containers, schedule nightly scans of build servers, and integrate alerts with a Slack channel plus email to the owner. Each scenario documents installations, dates, configuration baselines, and responsible personnel to support Compliance Framework evidence requirements.

Compliance tips, validation, and best practices

Document everything: configuration baselines, deployment dates, exceptions, and compensating controls. Perform validation monthly: run an anti-malware test file (EICAR) in a safe lab to confirm detection and response, run simulated phishing campaigns to test email scanning, and conduct quarterly tabletop exercises for containment. Use vulnerability and patch management alongside anti-malware — outdated software increases exploit risk. Where possible implement application allowlisting on servers that run a fixed set of binaries to reduce attack surface.

Risk of non-implementation

Failure to implement SI.L1-B.1.XIII exposes organizations to ransomware, data exfiltration, supply chain compromise, and contract loss. For DoD contractors, noncompliance with CMMC mappings and FAR 52.204-21 can lead to contract disqualification, reputational harm, and direct financial loss from incidents. Technically, an unprotected endpoint can be the pivot point that spreads malware across the network, corrupts backups, and encrypts FCI, making recovery time and cost exponentially larger.

Summary: to meet Compliance Framework SI.L1-B.1.XIII and satisfy FAR 52.204-21 / CMMC 2.0 Level 1 expectations, create a scoped inventory, deploy anti-malware/EDR across all in-scope assets, enable automated updates and logging, integrate detections with an incident response playbook, and maintain documented validation and training. With the checklist and examples above, small businesses can implement practical, verifiable controls that reduce risk and produce audit-ready evidence.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes