🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Evidence-Ready Checklist for Malicious Code Protections — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII

Step-by-step guidance to build an evidence-focused checklist that demonstrates compliance with FAR 52.204-21 and CMMC 2.0 Level 1 malicious code protections (SI.L1-B.1.XIII).

April 09, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, evidence-focused checklist and implementation guidance to meet malicious code protection expectations under FAR 52.204-21 and CMMC 2.0 Level 1 (Control SI.L1-B.1.XIII), with actionable steps, specific technical checks, and sample artifacts a small business can gather for an audit or assessment under the Compliance Framework.

What "evidence-ready" means for malicious code protections

An evidence-ready approach means you can present verifiable artifacts that demonstrate the control was implemented and operating as intended at the time(s) required by the auditor: policy documents, a deployment/inventory record of anti-malware/EDR coverage, configuration baselines, logs showing up-to-date signatures and scans, incident tickets for detections and remediations, and approvals for any exceptions. For Compliance Framework reviewers this translates to: (1) an implemented technical control; (2) proof of coverage and currency; and (3) documentation of exceptions, testing, and review. Capture timestamps, hostnames, agent versions, and exportable console reports so evidence is unambiguous.

Evidence-ready checklist: items to collect and how to format them

Create a checklist that maps each artifact to the control objectives. Required items should include: a written Malicious Code Protection policy (PDF with version and approval signature); an Approved Product List naming AV/EDR vendors and versions; an inventory CSV/Excel of endpoints with hostname, OS, agent version, last update timestamp, and deployment status; configuration baseline exports (JSON/XML/console screenshots) showing real-time protection enabled, auto-updates on, cloud protection enabled; scheduled scan reports and signature update logs; SIEM or local event log extracts with timestamps for detections; incident response tickets showing detection → containment → remediation steps; and any documented compensating controls or approved exceptions with risk acceptance. Name exported files with a convention like: MCCP_Policy_v1.2_2026-04-01.pdf and store them in a secure evidence folder with access logs.

Technical checks and commands small businesses can use

Include repeatable technical checks that auditors can reproduce. Examples: on Windows endpoints use PowerShell Get-MpComputerStatus to show real-time protection and signature timestamps, and sc query WinDefend to show the Defender service status; on Linux check clamav with freshclam -v and systemctl status clamav-daemon or run clamscan -r /path and capture the output; on macOS show management/EDR agent status from Jamf or the vendor console. For managed EDR/AV consoles, export endpoint summaries (CSV) showing agent_version, last_check_in, and last_update. If you integrate with a SIEM, export the detection events for a 90-day window and annotate with the corresponding ticket numbers. Store screenshots that include the console timestamp and your username to verify the data source.

Implementation steps tailored for a small business

Practical deployment approach: 1) Select a solution appropriate to your environment and budget (e.g., Microsoft Defender for Business for Windows-heavy shops, CrowdStrike/Falcon or SentinelOne for cross-platform EDR, ClamAV + osquery for constrained budgets). 2) Use an MDM (Intune, Jamf) or endpoint management tool to push the agent to all managed devices and maintain an inventory. 3) Configure policy templates centrally: enable real-time protection, cloud-delivered protections, exploit mitigation, automatic signature updates, and scheduled full scans weekly with daily quick scans. 4) Hard-code a logging/export schedule (weekly CSV export + monthly PDF report) and integrate with your SIEM or a central log store for retention. 5) Document exceptions (e.g., a lab system requiring an exclusion) through change control with a defined expiration and compensating controls. For small teams, automating evidence exports (daily or weekly) into a secure folder reduces audit-time scrambling.

Real-world small business scenarios and sample artifacts

Scenario A: A 25-person software consultancy using Microsoft 365 Business and Intune will deploy Defender for Business to all endpoints. Evidence gathered: Intune device inventory CSV, Defender console export showing last signature update and real-time protection enabled, PowerShell output Get-MpComputerStatus for five sample endpoints, a policy PDF describing scheduled scans, and one incident ticket where Defender blocked a phishing dropper (ticket ID, detection log screenshot, remediation steps). Scenario B: A small manufacturer with 40 PCs and an isolated OT network uses application allowlisting for production machines and a lightweight AV for office systems. Evidence includes an allowlist export, configuration baselines for production machines, scan reports for office systems, and a monthly review spreadsheet documenting review and change approvals. These artifacts show auditors both preventive measures (allowlisting) and detective measures (scans, logs).

Compliance tips, retention, and best practices

Best practices to keep evidence audit-ready: define retention (e.g., keep signed policy versions and monthly evidence bundles for 2–3 years or per contract), timestamp and hash exported evidence files, keep an evidence index document mapping items to control clauses, and rotate screenshots with console exports instead of relying on ad-hoc screenshots. Implement defense-in-depth—email filtering, web gateway, endpoint protections, and least-privilege—so a single failure does not equate to non-compliance. Run quarterly tabletop exercises to validate you can retrieve evidence within the timeframe expected by auditors and document the test results. If an exception is required, create a short-lived compensating control and record acceptance by an authorized approver.

Risk of not implementing or documenting these protections

Failure to implement and document malicious code protections exposes the organization to technical and contractual risk: increased probability of ransomware or data exfiltration, loss of Controlled Unclassified Information (CUI), contract penalties or termination under FAR 52.204-21, lower CMMC assessment scores, and reputational damage. From an evidence perspective, inability to produce logs or proof of configuration during an audit commonly triggers findings that require corrective action plans, potential loss of future DoD contracts, and remediation costs far higher than upfront investment in tooling and documentation.

Summary

To satisfy FAR 52.204-21 and CMMC 2.0 Level 1 (SI.L1-B.1.XIII) for malicious code protections under the Compliance Framework, build a repeatable evidence checklist that includes policy, inventory, configuration baselines, update and scan logs, incident records, and exception approvals; use automated exports and consistent naming/retention practices; and implement practical, small-business friendly tooling and procedures (e.g., Defender for Business + Intune or a lightweight EDR) so you can produce reliable artifacts on demand. Start by drafting the checklist mapped to each control statement, automating exports where possible, and performing a retrieval drill monthly to ensure audit readiness.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes