🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Protect Cloud Workloads from Malicious Code for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII: Configurations, Tools, and Tests

Practical, step-by-step configurations, tools, and tests to protect cloud workloads from malicious code and meet FAR 52.204-21 / CMMC 2.0 Level 1 SI.L1-B.1.XIII requirements.

β€’
April 20, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Small contractors and SMBs that must comply with FAR 52.204-21 and CMMC 2.0 Level 1 (SI.L1-B.1.XIII) need pragmatic, repeatable controls to stop malicious code from reaching cloud workloads β€” this post gives concrete configurations, tool choices, and test procedures you can implement today to demonstrate compliance and reduce real-world risk.

What the control requires in practice

At Level 1 the objective is "basic cyber hygiene": prevent, detect, and respond to malicious code on systems that store, process, or transmit Covered Defense Information (CDI). For cloud workloads that means applying malware-defensive controls at build-time (image hardening), in transit (pipeline scanning and signing), and at runtime (EDR/IDS, host/container runtime policies), plus logging and documentation to prove you performed those steps for Compliance Framework assessments.

Practical configurations for cloud workloads

Start with secure image practices and runtime hardening. Build minimal images (Distroless or Alpine-minimal), remove package managers, and set immutable tags. In Kubernetes set at least these Pod-level settings: securityContext.runAsNonRoot: true, securityContext.readOnlyRootFilesystem: true, securityContext.allowPrivilegeEscalation: false. Apply a restrictive seccomp profile and enforce AppArmor/SELinux where available. For VMs, disable unused services, close unnecessary ports, and enable automatic OS-level patching (use AWS Systems Manager Patch Manager, Azure Update Management, or Google’s OS Patch Management).

Image signing, scanning, and SBOMs

Integrate image scanning and signing into CI: generate an SBOM with syft or cyclonedx, scan images with trivy or anchore, and sign images with cosign. Example CI step: trivy image --exit-code 1 --severity CRITICAL,HIGH myrepo/myimage:CI-${GITHUB_RUN_ID} to fail builds on high/critical findings. Store SBOMs and scan output as evidence for audits and provide immutable, signed images in a private registry (ECR/GCR/ACR) with image policy enforcement.

Runtime protections and network controls

Deploy runtime detection such as Falco (open-source) or a managed EDR like CrowdStrike/SentinelOne/Microsoft Defender for Endpoint. Enable host-based intrusion detection, container runtime rules to detect execs, unusual network connections, or shell activity in containers. Restrict egress with cloud egress rules and DNS filtering; block direct internet access from compute instances unless necessary. Apply least-privilege IAM roles to workloads (use Workload Identity on GCP, IAM Roles for Service Accounts on AWS) to limit impact if a workload is compromised.

Tools (managed & open-source) and deployment notes

Cost-effective toolset for small businesses: Trivy for image scanning, Syft for SBOMs, Cosign for signing, Falco for runtime alerts, Wazuh or OSSEC for host-based monitoring, and an affordable EDR (or Defender for Business). Cloud-native managed options: AWS Inspector + ECR image scanning + GuardDuty + Defender for Containers (Azure) or Binary Authorization on GKE. For each tool, deploy agents via automation (Terraform/CloudFormation/ARM) and include agent install and configuration in your build scripts to ensure consistent baseline across environments.

Tests and validation you should run regularly

Validate detection and response with safe, repeatable tests: place an EICAR test file in a workload (e.g., create a file containing the EICAR test string) to confirm your malware scanners detect and alert; run image scans in CI and purposely introduce a known-vulnerable package to confirm failures; simulate runtime anomalies with benign commands (e.g., unexpected bash exec in a container) and verify Falco/EDR alerts and your incident playbook. Maintain a runbook and record timestamps/screenshots/logs as compliance evidence.

Compliance tips, evidence collection, and common pitfalls

Document each step: CI scan configuration, SBOM outputs, image signing artifacts, runtime alert logs, and remediation tickets. Keep logs centralized in a cloud SIEM (CloudWatch Logs, Azure Monitor, GCP Logging) and retain at least the period your assessors expect; for small businesses 90–180 days is typical. Avoid relying solely on default cloud settings; explicitly enable image verification, automation of patching, and proof of non-root containers. Common pitfalls: unsigned images in production, missing SBOMs, no runtime detection, and lack of documented test results.

Risk of not implementing these controls

Without these controls attackers can introduce backdoors, cryptominers, or data exfiltration tools into your workloads. For contractors that can mean loss of contracts, damage to reputation, regulatory penalties, and the practical cost of incident response. From a compliance perspective, lacking demonstrable build-time scanning, image signing, runtime detection, and evidence of testing will fail an assessor for FAR 52.204-21 / CMMC Level 1 requirements.

Summary: implement a layered approach β€” hardened images, CI-integrated scanning and SBOMs, image signing, runtime detection/EDR, network egress control, and documented, repeatable tests β€” and capture logs and artifacts as audit evidence. For a small business, prioritize cloud-managed services where possible, supplement with open-source scanning and runtime tools, automate everything in CI/CD, and run regular, documented tests (EICAR, CI failure injection, runtime anomaly simulation) to both reduce risk and demonstrate compliance under the Compliance Framework.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes