Refer to the following Malware Presence insights and assessments and how they're mapped to CIS v7 and CIS v8 controls for Control Insights:
Multiple Desktop Malware Families
The detection of multiple desktop malware families indicates weak control over malicious desktop software
Over 1 distinct event types from: [Desktop Compromised System] were observed
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls10 Malware Defenses Safeguards
|
Controls8 Malware Defenses Safeguards
|
Multiple Mobile Malware Families
The detection of multiple mobile malware families indicates weak control over malicious mobile software
Over 1 distinct event types from: [Mobile Compromised System] were observed
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls
Safeguards
|
Controls
Safeguards
|
No Malware Infections
The lack of malware infections indicates effective malware protection or endpoint configurations.
The ratio of events of type [Compromised System] by type [Web Browser] is below 0.1%
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls10 Malware Defenses Safeguards
|
Controls8 Malware Defenses Safeguards
|
Domain Generation Algorithm Malware
The presence of Domain Generation Algorithm (DGA) based malware indicates ineffective network filtering or monitoring of network security audit logs
At least one event of the following event types was detected: [Domain Generation Algorithm (DGA) Based Malware]
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls
Safeguards
|
Controls
Safeguards
|
Old or Abandoned Malware
The presence of malware infections from old, abandoned, malware families indicates ineffective malware prevention, intrusion detection, boundary defense, or incident response
At least one event of the following event types was detected: [Abandoned Malware]
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls
Safeguards
|
Controls
Safeguards
|
Malware Infections
The presence of malware infections indicates ineffective malware protection or endpoint configurations
The ratio of events of type [Compromised System] by type [Web Browser] is above 0.5%
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls
Safeguards
|
Controls
Safeguards
|
Malware on Exposed IoT Device
The presence of malware on an exposed Internet-of-Things (IoT) device indicates ineffective control of hardware assets on the network
At least one event from all of the following event types were detected: [Internet-of-Things (IoT) System Compromised with Worm, Internet-of-Things (IoT) Service Port]
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls1 Inventory and Control of Enterprise Assets Safeguards
|
Controls1 Inventory and Control of Hardware Assets Safeguards
|
Persistent or Recurring Infections
The presence of persistent or recurring malware infections indicates ineffective malware protections or incident response
At least one event of the following event types was present for at least 1 month(s)[Compromised System]
Assessment
Observations
CIS v8 Controls | CIS v7 Controls |
---|---|
Controls
Safeguards
|
Controls
Safeguards
|
- April 1, 2025: Published.
Feedback
0 comments
Please sign in to leave a comment.