Search


Prevent Malware From Being Delivered and Spreading to Devices

(Back)

Objective

Implement and maintain a defence-in-depth model to prevent the delivery and spread of malware to devices and across networks.

Description

References

TBS

  1. DSD Appendix G - Email Management Configuration Requirements (1.3)
  2. DSD, Appendix G - Remote Access Configuration Requirements (3 and 4)
  3. DSD, Appendix G - System Management Configuration Requirements (3, 4 and 5)
  4. DSD Appendix G - Endpoint Management Configuration Requirements (5)
  5. DSM Appendix B (B.2.3.6.1, B.2.3.7.2 and B.2.3.7.3), and
  6. DSM Appendix H (H.2.2.2 and H.2.2.2.3)

CCCS

  1. Baseline Security Requirements for Network Security Zones in the Government of Canada (ITSG-22) (C.4.1)
  2. Network Security Zoning (ITSG-38) (2)
  3. Implementation Guidance: Email Domain Protection (ITSP.40.065),
  4. Ransomware Playbook (ITSM.00.099) (2.1.1 and 2.2.7)
  5. Don’t Take the Bait: Recognize and Avoid Phishing Attacks, and
  6. Cyber Hygiene

AC‑4, AC-17, AT-2, AT-2(1), AT-3, AT-3(3), AT-3(4), CA-2, RA-5, SC-3, SC-3(1), SC-7, SI-2, SI-3,