8.4: Configure Anti-Malware Scanning of Removable Media

Sub-control 8.4 states that you must configure devices so that they automatically conduct an anti-malware scan of removable media when inserted or connected.

Asset Type Security Function Implementation Groups
Devices Detect 1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory
  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. Endpoint Inventory: The endpoint inventory with an entry for each endpoint indicating whether or not that endpoint can support anti-malware software or not.
  2. Desired anti-malware configuration: The desired configuration to automatically scan removable media when inserted/connected.

Assumptions

  • Some endpoints, such as network devices, may not support anti-malware software. Whether an endpoint supports anti-malware software is provided as part of I1. Devices that cannot support anti-malware software are removed from the list of endpoints to be checked during Operation 1, and these devices are not counted in the metric below.

Operations

  1. Refine the endpoint inventory (I1) to only contain endpoints that can support anti-malware software endpoint inventory. This reduced list of endpoints becomes M1.

  2. Of the set of endpoints that can support anti-malware software (M1), generate a list of those endpoints that actually have anti-malware software installed, enabled, and adhere to the configuration specified in I2 (M2). Then, generate a list of the endpoints that do not adhere to the specified configuration (M3). Note: Endpoints in M1 that do not have anti-malware installed and enabled, are considered non-compliant and added to M3.

Measures

Measure Definition
M1 = List of endpoints capable of supporting anti-malware software

A list of all endpoints that have anti-malware software installed.

M2 = List of endpoints with an acceptable version of anti-malware software installed, enabled, and properly configured to scan removable media (compliant list) A list of endpoints that have supported versions of anti-malware that are installed, enabled, and properly configured to scan removable media.

M3 = List of endpoints not adhering to the specified configuration (non-compliant list)

A list of endpoints that do not adhere to the specified configuration.

M4 = Count of items in M1 A count of the total number of items in M1.
M5 = Count of items in M2 A count of the total number of items in M2.
M6 = Count of items in M3 A count of the total number of items in M3.

Metrics

Coverage

Metric Calculation
The ratio of endpoints that are compliant with the desired anti-malware configuration compared to the total number of endpoints capable of supporting anti-malware software. M5 / M4