Use behavior-based anti-malware software.
Asset Type | Security Function | Implementation Groups |
---|---|---|
Devices | Detect | 2, 3 |
- Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory
- Safeguard 2.1: Establish and Maintain a Software Inventory
- Safeguard 4.1: Establish and Maintain a Secure Configuration Process
GV1
: Enterprise asset inventoryGV5
: Authorized sofware inventoryGV3
: Configuration standards
- Use
GV1
to identify and enumerate assets capable of supporting behavior-basaed anti-malware software (M1) - Use
GV5
to identify authorized behavior-basaed anti-malware software - For each asset identified in Operation 1, use the output of Operation 2
- Identify and enumerate assets with at least one authorized behavior-based anti-malware software intalled (M2)
- Identify and enumerate assets without any behavior-based anti-malware software installed (M3)
- For each asset wih a least one authorized behavior-based anti-malware software installed from Operation 3.1, use
GV3
to check configurations - Identify and enumerate assets with properly configured behavior-based anti-malware software (M4)
- Identify and enumerate assets with improperly configured behavor-based anti-malware software (M5)
- For each asset wih a least one authorized behavior-based anti-malware software installed from Operation 3.1, use
- M1 = Count of assets capable of supporting behavor-based anti-malware software
- M2 = Count of assets with at least one authorized behavior-based anti-malware software installed
- M3 = Count of assets without any behavior-based anti-malware software installed
- M4 = Count of assets with properly configured authorized behavior-based anti-malware software installed
- M5 = Count of assets with improperly configured authorized behavior-based anti-malware software installed
Metric | The percentage of assets with properly configured authorized |
behavior-based anti-malware installed |
Calculation | M4 / M1 |