CMMC SC.4.202 - Analyze Executable Code and Scripts

CMMC SC.4.202 - Analyze Executable Code and Scripts

Requirement text: SC.4.202: Employ mechanisms to analyze executable code and scripts (e.g., sandbox)
traversing Internet network boundaries or other organizationally defined boundaries.

DISCUSSION FROM SOURCE: CMMC
Advanced malicious executable code has become much better at evading signature-based
detection and protection capabilities. Sandboxes and other advanced analytics are more
advanced defenses that allow the code or script to execute in an isolated, controlled, and
instrumented environment to detect signs of malicious activity.

CMMC CLARIFICATION
The organization shall install systems that automatically analyze executable and mobile code
passing through the system boundary (e.g., downloaded from the Internet or other
transmission method.) This practice is not focused on email, which is covered in practice
SI.3.220. Any executable or mobile code identified as suspicious should be quarantined and
not allowed to pass through to the user until confirmed not to be malware or required for a
business purposes.

Example
You are the data security manager for the organization. You have learned that staff routinely
browse the Internet and download PDF files and executables as part of their work
assignments. To ensure the downloaded files do not contain malware, you install a sandbox
appliance in the DMZ which checks all downloads for malicious content.

References
• CMMC
• NIST SP 800-53 Rev 4 SC-44
    • Related Articles

    • CMMC SC.3.188 - Control the Use of Mobile Code

      Requirement text: SC.3.188: Control and monitor the use of mobile code. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Mobile code technologies include Java, JavaScript, ActiveX, Postscript, PDF, Shockwave movies, Flash animations, and VBScript. ...
    • Systems and Communications Protection: SP 800-171 Security Family 3.13

      System and communications protection requirements provide an array of safeguards for the system. Some of the requirements in this family address the confidentiality information at rest and in transit. The protection of confidentiality can be provided ...
    • CMMC MA.3.116 - Check Maintenance Media for Malicious Code

      Requirement text: MA.3.116: Check media containing diagnostic and test programs for malicious code before the media are used in organizational systems. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 If, upon inspection of media containing ...
    • CMMC SC.5.208 - Employ Advances Boundary Protections

      Requirement text: SC.5.208: Employ organizationally defined and tailored boundary protections in addition to commercially available solutions.  DISCUSSION FROM SOURCE: CMMC Advanced adversaries study and analyze standard commercial security solutions ...
    • CMMC IR.2.094 - Analyze Security Events

      Requirement text: IR.2.094: Analyze and triage events to support event resolution and incident declaration. DISCUSSION FROM SOURCE: CERT RMM V1.2 The triage of event reports is an analysis activity that helps the organization to gather additional ...