CMMC MA.3.116 - Check Maintenance Media for Malicious Code

CMMC MA.3.116 - Check Maintenance Media for Malicious Code

Requirement text: MA.3.116: Check media containing diagnostic and test programs for malicious code
before the media are used in organizational systems.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2
If, upon inspection of media containing maintenance diagnostic and test programs,
organizations determine that the media contain malicious code, the incident is handled
consistent with incident handling policies and procedures.

CMMC CLARIFICATION
As part of troubleshooting a vendor may provide a diagnostic application to install on a
system. The vendor is using the application to help identify the cause of issues on the system.
As this is executable code there is a chance that the file is corrupt or infected with malicious
code. Implement procedures to scan any files prior to installation. The same level of scrutiny
must be made as with any file a staff member may download.

Example
You’ve recently been experiencing performance issues on one of your servers. After
troubleshooting for much of the morning the vendor has asked to install a utility that will
collect more data from the server. The file is stored on their FTP server. The support
technician gives you the FTP site so you can anonymously download the utility file. You also
ask him for a hash of the utility file. As you download the file to your local computer you
realize it is compressed. While you have anti-virus on your server you don’t want to cause
any issues that may further impact business operations. On your desktop you unzip the file.
Once the file is unzipped you open your local anti-virus and perform a manual scan of the
utility file. The scan reports no issues. To further verify the utility file has not been tampered
you run an application to see that the hash from the vendor matches.

References
• NIST SP 800-171 Rev 1 3.7.4
• NIST SP 800-53 Rev 4 MA-3(2)
    • Related Articles

    • CMMC MA.2.112 - Control System Maintenance Tools

      Requirement text: MA.2.112: Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 This requirement addresses security-related issues with maintenance ...
    • CMMC SI.1.213 – Enable Malicious Code Scanning

      Requirement text: SI.1.213: Perform periodic scans of information systems and real-time scans of files from external sources as files are downloaded, opened, or executed. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Periodic scans of ...
    • CMMC Level 1 Overview - Basic Cyber Hygiene

      CMMC Level 1 l focuses on Federal Contract Information (FCI), which is defined as “information, not intended for public release, that is provided by or generated for the Government under a contract to develop or deliver a product or service to the ...
    • CMMC SI.1.212 – Update Malicious Code Protections

      Requirement text: SI.1.212: Update malicious code protection mechanisms when new releases are available. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Malicious code protection mechanisms include anti-virus signature definitions and ...
    • CMMC MA.2.111 - Perform System Maintenance

      Requirement text: MA.2.111: Perform maintenance on organizational systems. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 This requirement addresses the information security aspects of the system maintenance program and applies to all types of ...