🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Test and Validate Malicious Code Protections (FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XIII) Before Assessment

Step-by-step guidance for small businesses to test and validate malicious code protections required by FAR 52.204-21 and CMMC 2.0 Level 1 so you pass assessment with clear, repeatable evidence.

β€’
April 08, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Malicious code protections are a foundational element of FAR 52.204-21 and the CMMC 2.0 Level 1 practice SI.L1-B.1.XIII β€” and if they are not tested and validated before an assessment, small businesses risk failing the assessment, losing contracts, or suffering an avoidable compromise; this guide gives practical, actionable steps to test, validate, and document your protections so you can demonstrate compliance.

Scope and mapping to Compliance Framework

FAR 52.204-21 requires basic safeguarding of covered contractor information systems, and CMMC 2.0 Level 1 maps to these same basic practices; SI.L1-B.1.XIII specifically calls for controls to detect and protect against malicious code. For small organizations that must meet the Compliance Framework, the practical objectives are (1) deploy endpoint anti-malware/anti-spyware, (2) enable real-time protection and signature/telemetry updates, (3) quarantine and remediation functionality, and (4) evidence that these protections operate across all covered endpoints. Implementation notes: scope your β€œcovered contractor information systems” (workstations, laptops, servers, and removable media endpoints), decide whether you use cloud-managed AV/EDR, and standardize agent configuration and update channels.

Practical pre-assessment testing steps

Begin with an accurate inventory and baseline: enumerate all endpoints in scope (IP, hostname, OS, owner, last-seen timestamp) and record agent status (installed version, last signature update, real-time protection enabled). Use your management console to export a CSV of devices and filter for missing agents or old signatures. For Windows endpoints you can run a quick local check from PowerShell: Get-MpComputerStatus | Select AntivirusEnabled, RealTimeProtectionEnabled, AntivirusSignatureVersion, AntivirusSignatureLastUpdated. For Linux servers using ClamAV: systemctl status clamav-daemon and freshclam --verbose to confirm signature freshness.

EICAR test and safe detection checks

Use the EICAR test file to validate detection and quarantine behavior without introducing any real malware. Example (PowerShell): Set-Content -Path C:\Temp\eicar.com -Value 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*'. The AV should detect and quarantine or delete the file immediately; record the event from the AV console or local logs. Verify not only detection but the entire remediation flow: the quarantine location, admin notification, and any automated ticketing integration. If detection is disabled for that endpoint, document the exception and remedial plan β€” exceptions are acceptable only with strong justification and documented compensating controls.

Verifying endpoint coverage and management

For centrally managed solutions (e.g., Microsoft Defender for Endpoint, CrowdStrike Falcon, SentinelOne), verify agent rollout, last-seen, and signature/engine versions from the console. Pull a report showing agent version and last heartbeat for every asset in scope and mark any older than your policy threshold (e.g., 7 days) as non-compliant until remediated. If you manage devices offline or in remote locations, include a method to update signatures (WSUS/SCCM, vendor offline package, or periodic physical updates) and test it by isolating a device from the network, applying the offline update, and confirming the signature timestamp advances.

Incident simulation and response validation

Testing detection is necessary but not sufficient β€” you also must validate response procedures. Simulate common scenarios: an endpoint with a detected malicious file, an email attachment that triggered detection, and a removable USB with a suspicious executable. For each, exercise the playbook: detection alert β†’ quarantine β†’ analyst verification β†’ malware removal or image rebuild β†’ restore from backup where necessary. Time each step and record timestamps and communications. Small businesses will often find gaps in notification and escalation; close those gaps and capture the evidence (ticket IDs, remediation entries, screenshots from consoles) for assessors.

Evidence collection and documentation for assessors

Assessors will expect clear evidence that controls are implemented and operating. Collect exports and screenshots from management consoles showing device lists, signature/version reports, detection events (including EICAR tests), quarantine entries, and remediation tickets. Supplement console evidence with local artifact captures such as the EICAR file detection log entry (Windows: confirm via Defender operational log or Get-MpThreatDetection; Linux: clamscan output). Maintain a central binder or repository (PDFs or CSVs) with timestamps, who performed each test, and change control records for any configuration changes made for the assessment.

Real-world small business scenarios and examples

Example 1 β€” Managed Services Provider (MSP) client: A 15-person engineering firm uses an MSP-managed Defender solution. Before assessment, the MSP exports a device report showing two laptops had not checked in for 12 days; the MSP used the EICAR test via remote script to show the agent detected and quarantined the file, then produced a remediation ticket and an updated inventory export to demonstrate closure.

Example 2 β€” Remote workforce with BYOD: A subcontractor uses permitted BYOD for some non-CUI tasks. The small business identified these devices as out-of-scope for CUI protection but ensured all corporate-owned devices had enforced AV. For assessments, they provided policy documentation restricting CUI to corporate-managed devices, plus AV console reports for those corporate assets.

Compliance tips and best practices

Keep these practical controls in place: enforce automatic signature updates and real-time protection by policy; require centralized agent management and automated reporting; use EICAR tests quarterly and retain logs for at least 12 months; document all exceptions in a risk register and tie them to compensating controls; and run regular tabletop incident response drills to validate procedures. Where possible, adopt simple allowlisting for high-risk servers and restrict removable media with device control policies. Finally, maintain an evidence folder mapped to each practice in the Compliance Framework so assessors can quickly verify each requirement.

Failing to implement and validate malicious code protections increases the risk of data exfiltration, ransomware, lateral movement, loss of contracts, and regulatory penalties β€” all outcomes that are far costlier than the modest effort required to deploy, test, and document AV/EDR controls. With the steps above (inventory, EICAR testing, update verification, incident simulation, and evidence collection), a small business can produce repeatable artifacts that demonstrate compliance with FAR 52.204-21 and CMMC 2.0 Level 1 SI.L1-B.1.XIII.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes