Cyber Posture

NIST 800-53 r5 · Controls catalogue · Family SI

SI-3Malicious Code Protection

Implement {{ insert: param, si-03_odp.01 }} malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; Automatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures; Configure malicious code protection mechanisms to: Perform periodic scans of the system {{ insert: param, si-03_odp.02 }} and real-time scans of files from external sources at {{ insert: param, si-03_odp.03 }} as the files are downloaded, opened, or executed in accordance with organizational policy; and {{ insert: param, si-03_odp.04 }} ; and send alert to {{ insert: param, si-03_odp.06 }} in response to malicious code detection; and Address the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.

Last updated: 09 May 2026 03:25 UTC

Implementations targeting this control (0)

ATT&CK techniques this control mitigates (224)

Weaknesses this control addresses (5)AI

CWEs ranked by how often they appear in real CVEs. The rationale describes how this control reduces exploitability of each weakness class.

CWE Name CVEs Why this control addresses it
CWE-434Unrestricted Upload of File with Dangerous Type4,869Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
CWE-502Deserialization of Untrusted Data3,125Identifies and blocks malicious code introduced through deserialization of untrusted data at system boundaries.
CWE-829Inclusion of Functionality from Untrusted Control Sphere254Detects and prevents inclusion of malicious functionality downloaded from untrusted control spheres.
CWE-494Download of Code Without Integrity Check242Performs real-time scans of downloaded code, mitigating risks from downloads lacking integrity checks.
CWE-506Embedded Malicious Code80Directly detects and eradicates embedded malicious code at entry/exit points via periodic and real-time scans.

Top CVEs where this control is the strongest mitigation

CVE Risk CVSS EPSS Match
CVE-2025-276652.09.80.0025good
CVE-2026-430031.68.00.0004good
CVE-2025-2783 KEV6.58.30.4745good
CVE-2025-8088 KEV4.38.80.0829good
CVE-2026-21510 KEV4.08.80.0404good
CVE-2025-17162.99.80.1625partial
CVE-2024-547562.19.80.0211good
CVE-2026-48092.09.80.0056good
CVE-2025-668022.09.80.0052good
CVE-2025-19452.09.80.0091good
CVE-2025-221332.09.90.0042good
CVE-2025-671642.09.90.0015good
CVE-2025-119482.09.80.0037good
CVE-2024-571692.09.80.0033good
CVE-2026-35352.09.80.0034good
CVE-2025-650992.09.80.0009good
CVE-2026-64432.09.80.0006good
CVE-2025-341952.09.80.0123partial
CVE-2019-256471.88.80.0029good
CVE-2026-285021.88.80.0028partial
CVE-2026-290411.88.80.0022good
CVE-2021-479041.88.80.0046good
CVE-2022-509361.88.80.0089partial
CVE-2021-477571.88.80.0064good
CVE-2025-211761.88.80.0141partial

Other controls in family SI

SI-1 SI-10 SI-11 SI-12 SI-13 SI-14 SI-15 SI-16 SI-17 SI-18 SI-19 SI-2 SI-20 SI-21 SI-22 SI-23 SI-4 SI-5 SI-6 SI-7 SI-8 SI-9