This post provides a practical, evidence-focused checklist and implementation guidance to meet malicious code protection expectations under FAR 52.204-21 and CMMC 2.0 Level 1 (Control SI.L1-B.1.XIII), with actionable steps, specific technical checks, and sample artifacts a small business can gather for an audit or assessment under the Compliance Framework.
What "evidence-ready" means for malicious code protections
An evidence-ready approach means you can present verifiable artifacts that demonstrate the control was implemented and operating as intended at the time(s) required by the auditor: policy documents, a deployment/inventory record of anti-malware/EDR coverage, configuration baselines, logs showing up-to-date signatures and scans, incident tickets for detections and remediations, and approvals for any exceptions. For Compliance Framework reviewers this translates to: (1) an implemented technical control; (2) proof of coverage and currency; and (3) documentation of exceptions, testing, and review. Capture timestamps, hostnames, agent versions, and exportable console reports so evidence is unambiguous.
Evidence-ready checklist: items to collect and how to format them
Create a checklist that maps each artifact to the control objectives. Required items should include: a written Malicious Code Protection policy (PDF with version and approval signature); an Approved Product List naming AV/EDR vendors and versions; an inventory CSV/Excel of endpoints with hostname, OS, agent version, last update timestamp, and deployment status; configuration baseline exports (JSON/XML/console screenshots) showing real-time protection enabled, auto-updates on, cloud protection enabled; scheduled scan reports and signature update logs; SIEM or local event log extracts with timestamps for detections; incident response tickets showing detection → containment → remediation steps; and any documented compensating controls or approved exceptions with risk acceptance. Name exported files with a convention like: MCCP_Policy_v1.2_2026-04-01.pdf and store them in a secure evidence folder with access logs.
Technical checks and commands small businesses can use
Include repeatable technical checks that auditors can reproduce. Examples: on Windows endpoints use PowerShell Get-MpComputerStatus to show real-time protection and signature timestamps, and sc query WinDefend to show the Defender service status; on Linux check clamav with freshclam -v and systemctl status clamav-daemon or run clamscan -r /path and capture the output; on macOS show management/EDR agent status from Jamf or the vendor console. For managed EDR/AV consoles, export endpoint summaries (CSV) showing agent_version, last_check_in, and last_update. If you integrate with a SIEM, export the detection events for a 90-day window and annotate with the corresponding ticket numbers. Store screenshots that include the console timestamp and your username to verify the data source.
Implementation steps tailored for a small business
Practical deployment approach: 1) Select a solution appropriate to your environment and budget (e.g., Microsoft Defender for Business for Windows-heavy shops, CrowdStrike/Falcon or SentinelOne for cross-platform EDR, ClamAV + osquery for constrained budgets). 2) Use an MDM (Intune, Jamf) or endpoint management tool to push the agent to all managed devices and maintain an inventory. 3) Configure policy templates centrally: enable real-time protection, cloud-delivered protections, exploit mitigation, automatic signature updates, and scheduled full scans weekly with daily quick scans. 4) Hard-code a logging/export schedule (weekly CSV export + monthly PDF report) and integrate with your SIEM or a central log store for retention. 5) Document exceptions (e.g., a lab system requiring an exclusion) through change control with a defined expiration and compensating controls. For small teams, automating evidence exports (daily or weekly) into a secure folder reduces audit-time scrambling.
Real-world small business scenarios and sample artifacts
Scenario A: A 25-person software consultancy using Microsoft 365 Business and Intune will deploy Defender for Business to all endpoints. Evidence gathered: Intune device inventory CSV, Defender console export showing last signature update and real-time protection enabled, PowerShell output Get-MpComputerStatus for five sample endpoints, a policy PDF describing scheduled scans, and one incident ticket where Defender blocked a phishing dropper (ticket ID, detection log screenshot, remediation steps). Scenario B: A small manufacturer with 40 PCs and an isolated OT network uses application allowlisting for production machines and a lightweight AV for office systems. Evidence includes an allowlist export, configuration baselines for production machines, scan reports for office systems, and a monthly review spreadsheet documenting review and change approvals. These artifacts show auditors both preventive measures (allowlisting) and detective measures (scans, logs).
Compliance tips, retention, and best practices
Best practices to keep evidence audit-ready: define retention (e.g., keep signed policy versions and monthly evidence bundles for 2–3 years or per contract), timestamp and hash exported evidence files, keep an evidence index document mapping items to control clauses, and rotate screenshots with console exports instead of relying on ad-hoc screenshots. Implement defense-in-depth—email filtering, web gateway, endpoint protections, and least-privilege—so a single failure does not equate to non-compliance. Run quarterly tabletop exercises to validate you can retrieve evidence within the timeframe expected by auditors and document the test results. If an exception is required, create a short-lived compensating control and record acceptance by an authorized approver.
Risk of not implementing or documenting these protections
Failure to implement and document malicious code protections exposes the organization to technical and contractual risk: increased probability of ransomware or data exfiltration, loss of Controlled Unclassified Information (CUI), contract penalties or termination under FAR 52.204-21, lower CMMC assessment scores, and reputational damage. From an evidence perspective, inability to produce logs or proof of configuration during an audit commonly triggers findings that require corrective action plans, potential loss of future DoD contracts, and remediation costs far higher than upfront investment in tooling and documentation.
Summary
To satisfy FAR 52.204-21 and CMMC 2.0 Level 1 (SI.L1-B.1.XIII) for malicious code protections under the Compliance Framework, build a repeatable evidence checklist that includes policy, inventory, configuration baselines, update and scan logs, incident records, and exception approvals; use automated exports and consistent naming/retention practices; and implement practical, small-business friendly tooling and procedures (e.g., Defender for Business + Intune or a lightweight EDR) so you can produce reliable artifacts on demand. Start by drafting the checklist mapped to each control statement, automating exports where possible, and performing a retrieval drill monthly to ensure audit readiness.