🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.2

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.2

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - SI.L2-3.14.2 – Provide protection from malicious code at appropriate locations within organizational information systems.

Understanding the Requirement

This control requires you to identify the places in your IT environment where malicious code can enter or run, and to deploy protections at those locations so malware is detected, blocked, or removed. This control is part of NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 and focuses on covering endpoints, servers, gateways, and other likely infection points with anti-malware tools, complemented by processes for updating, monitoring, and responding to detections.

Technical Implementation

  • Inventory and designated locations: Create and maintain a simple inventory of all endpoints (workstations, laptops, servers, mobile devices), network gateways (firewalls, email gateways, web proxies), and removable-media points. Use that list to define where anti-malware must be installed and where network-level detection must run.
  • Deploy endpoint anti-malware with centralized management: Install a reputable anti-malware/EDR agent on every managed workstation and server. Use a centralized console to push signature and engine updates, enforce real-time scanning, schedule full scans, and collect alerts. For SMBs, select a managed/cloud console to avoid maintaining complex infrastructure.
  • Layer network protections: Configure your email gateway and web proxy/firewall to perform malware scanning and block known-bad attachments, links, and file types. Where available, enable sandboxing for suspicious attachments and enable malware inspection on VPN concentrators and remote access gateways to protect remote users.
  • Protect mobile and removable media: Use mobile device management (MDM) to enforce anti-malware or device controls on corporate mobile devices and require disk encryption. Implement scanning of removable media at endpoints or disallow use per policy; if allowed, enforce automatic scanning on insertion and block autorun.
  • Maintenance, updates, and tuning: Automate signature and engine updates and ensure the console notifies IT of failed updates. Tune detection thresholds to reduce false positives and document whitelisting procedures for business-critical apps. Schedule periodic signature and definition validation tests to confirm updates are applied.
  • Logging, monitoring, and response: Forward anti-malware alerts to a centralized log or SIEM and define simple alerting rules for high-severity detections. Establish an incident handling playbook with steps to isolate infected systems, preserve evidence, clean or rebuild hosts, and notify stakeholders. Track metrics like detection counts and time-to-remediation.

Example in a Small or Medium Business

Maria manages IT for a 60-person engineering firm. She starts by creating an inventory of all company devices and identifies endpoints, two file servers, the email gateway, and a cloud backup appliance as critical locations. Maria deploys an enterprise anti-malware agent across all Windows and macOS workstations and servers using the vendor's cloud management console so updates and alerts are centrally visible. She configures the company's email gateway to block executable attachments and to scan Office documents for macros and embedded threats, and enables web filtering to stop downloads from high-risk sites. For remote employees, Maria requires the company VPN and enforces device checks before allowing access, while mobile devices are enrolled in MDM with enforced passcode and remote wipe. She sets up daily signature updates, schedules weekly full scans for servers, and creates an incident checklist that instructs the help desk to isolate affected hosts and escalate severe detections to her. Over the first month, the team tunes exclusions for a few development tools and documents changes so they won't be lost when onboarding new devices.

Summary

Combining policy (inventory, designated protection points, and incident procedures) with technical controls (endpoint anti-malware/EDR, network scanning at gateways, MDM for mobiles, automated updates, and centralized monitoring) gives SMBs practical coverage against malicious code. These measures reduce infection pathways, speed detection, and ensure consistent, auditable responses—helping you meet the requirement to provide protection from malicious code at appropriate locations in your environment.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes