8.1: Utilize Centrally Managed Anti-Malware Software

Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization’s workstations and servers.

Asset Type

Security Function

Implementation Groups

Devices

Protect

2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Assumption(s)

  • It is assumed that this sub-control is specific to host-based anti-malware solutions.

Inputs

  1. List of deployed anti-malware software

  2. The list of endpoints

Operations

  1. For each deployed anti-malware solution, verify that it is centrally managed

  2. For each deployed anti-malware solution, enumerate the set of endpoints covered

  3. Union the set of covered endpoints

  4. Identify set of endpoints eligible for anti-malware coverage (i.e. network devices likely do not run anti-malware agents)

Measures

  • M1 = Count of anti-malware solutions in use

  • M2 = Count of anti-malware solutions that are centrally managed

  • M3 = Total number of endpoints covered by anti-malware solutions

  • M4 = Total number of endpoints eligible for anti-malware coverage

  • M5 = List of anti-malware solutions that are centrally managed

  • M6 = List of anti-malware solutions that are not centrally managed

  • M7 = List of endpoints covered by anti-malware solutions

  • M8 = List of endpoints not covered by anti-malware solutions

Metrics

Anti-Malware Management Coverage

Metric

Percentage of anti-malware solutions that are centrally managed

Calculation

M2 / M1

Endpoint Anti-Malware Coverage

Metric

Percentage of endpoints covered by anti-malware solutions

Calculation

M3 / M4