🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Train Staff and Enforce SOPs for File Scanning Compliance with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XV

Practical guidance to train personnel and enforce SOPs that ensure file-scanning requirements under FAR 52.204-21 and CMMC 2.0 Level 1 (SI.L1-B.1.XV) are met in small organizations.

β€’
April 22, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting the file-scanning requirement in the Compliance Framework β€” specifically to satisfy FAR 52.204-21 and the CMMC 2.0 Level 1 control SI.L1-B.1.XV β€” is as much about people and repeatable procedures as it is about technology; this post explains how to create enforceable SOPs and train staff in a small business so file scanning becomes a reliable compliance control rather than an afterthought.

Define clear SOPs that map to the Compliance Framework

Your first step is to codify an SOP that explicitly maps actions to the Compliance Framework controls. The SOP should state scope (endpoints, email, file servers, cloud storage), responsibilities (IT admin, security lead, contracting officer representative), frequency of actions (on-access plus nightly on-demand scans), and escalation paths for detections (quarantine, investigation, notification). A practical SOP example for a small business: 1) All inbound email attachments are scanned by the mail gateway and endpoint AV on receipt; 2) On-access scanning runs on endpoints with signature and heuristic checks enabled; 3) Any quarantined file triggers a ticket in the helpdesk system and a 4-hour initial review by the security lead; 4) Confirmed malicious files are removed/isolated and an incident report is created and stored for audits. Include exact filenames/paths and the location of audit logs that auditors will review.

Implement technical controls to make SOPs enforceable

Translate SOPs into technical configuration: enable on-access scanning on every managed endpoint and server; schedule full system scans nightly; configure your e-mail gateway (e.g., Exchange Online Protection, Proofpoint) to scan attachments and block file types not allowed by policy (e.g., .exe in email); enable automatic signature updates (no older than 24 hours); and deploy an EDR agent with behavioral detection that logs suspicious file executions to a SIEM. For cloud storage used by the business (Google Workspace, Microsoft 365, Box), implement API-based content scanning or a CASB that enforces the same scanning and quarantine rules. Technical detail example: set quarantine folder path to C:\Quarantine, retain quarantined samples for 30 days, decompress up to 3 nested archives for scanning, and log MD5/SHA256 hashes of quarantined files to the ticket for forensic correlation.

Train staff with role-based, scenario-driven content

Training must be practical and role specific. For end users, deliver short modules (15–30 minutes) covering why scans happen, how to handle a quarantine notification, and how to submit files for false-positive review. For IT/security staff, provide hands-on sessions that walk through the SOP: how to pull quarantine logs, how to triage suspicious files in a sandbox (or using a vendor sandbox service), how to update detection signatures, and how to complete the compliance evidence package. Use scenarios: a supplier email with a macro-enabled document that triggers a quarantine; a contractor plugging in a USB drive containing installers; or a user uploading a ZIP of source code to a cloud folder. Conduct tabletop exercises quarterly and a full play-through annually so staff have muscle memory for the SOP.

Enforce SOPs via monitoring, metrics, and change control

Enforcement requires measurement. Instrument the environment to collect these metrics: percent of endpoints reporting current signatures, number of quarantines per week, mean time to initial triage (target <4 hours), percent of false positives overturned, and policy exception requests granted. Feed these metrics into a weekly dashboard reviewed by management. Implement controls to prevent circumvention: disable local admin where possible, block autorun for removable media, and configure policies that prevent users from excluding files from scans. Use a formal change control process for any adjustments to scanning configurations and keep a change log that auditors can inspect.

Small business scenario: 25-person subcontractor

For a small subcontractor with ~25 staff who handle CUI, be pragmatic: use cloud-native protections where possible to avoid heavy infrastructure costs (e.g., Microsoft Defender for Business or an MSSP that provides endpoint scanning and managed detection). Write an SOP template that requires IT to enroll devices in MDM, enable automatic updates for the AV client, and mandate that any external file transfer (client upload, FTP, subcontractor dropbox) be routed through the company’s scanning gateway. Train non-IT staff with one live 30-minute session and short job aids (one-page checklists) and track completion in HR onboarding records. For evidence, retain screenshots of quarantine events, LMS completion reports, and signed SOP attestations in a compliance binder.

Compliance tips, best practices, and real risks of non-implementation

Best practices: adopt defense-in-depth (mail, gateway, endpoint, server, cloud scanning); keep signatures and OS patches current; enable behavioral/heuristic detection; maintain logs for at least 90 days to satisfy audit evidence; and have an exception policy with approval and compensating controls. Risks of not implementing: undetected malware can exfiltrate CUI, leading to contract termination, loss of future government work, reputational damage, and potential regulatory fines under FAR obligations. Operationally, poor processes lead to slow incident response, inconsistent evidence for auditors, and an inability to demonstrate that your organization "protects covered contractor information systems" as required by the Compliance Framework mapping to FAR 52.204-21 and CMMC practices.

Summary: make the file-scanning control a living process β€” write SOPs that map to the Compliance Framework control SI.L1-B.1.XV, implement enforceable technical settings (on-access scanning, mail and cloud scanning, signature cadence), run role-based training and scenario drills, measure performance with clear metrics, and retain artifacts for audits; doing so reduces risk and makes compliance with FAR 52.204-21 / CMMC 2.0 Level 1 demonstrable and repeatable for a small business.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes