SAMMY works best on screens 1024px wide or larger.
5.1: All security policies and operational procedures that are identified in Requirement 5 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures identified in Requirement 5 are managed in accordance with all elements specified in this requirement.
Description

Requirement 5.1.1

Purpose

Requirement 5.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 5. While it is important to define the specific policies or procedures called out in Requirement 5, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 5.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

5.1: Roles and responsibilities for performing activities in Requirement 5 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 5 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 5 to verify that roles and responsibilities are assigned as documented and are understood.
Description

Requirement 5.1.1

Purpose

Requirement 5.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 5. While it is important to define the specific policies or procedures called out in Requirement 5, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 5.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

5.2: An anti-malware solution(s) is deployed on all system components, except for those system components identified in periodic evaluations per Requirement 5.2.3 that concludes the system components are not at risk from malware.
  • Examine system components to verify that an anti-malware solution(s) is deployed on all system components, except for those determined to not be at risk from malware based on periodic evaluations per Requirement 5.2.3.
  • For any system components without an anti-malware solution, examine the periodic evaluations to verify the component was evaluated and the evaluation concludes that the component is not at risk from malware.
Description

Requirement 5.2.1

Purpose

Anti-malware solutions provide a critical layer of defense against malicious software that can compromise system components and cardholder data. Deploying anti-malware on all system components helps ensure comprehensive protection.

Good Practice

Anti-malware solutions should be deployed on all system components that are commonly affected by malware, including servers, workstations, and mobile devices. The type of anti-malware solution should be appropriate for the operating system and environment.

Requirement 5.2.2

Purpose

Not all system components are commonly affected by malware. Periodic evaluations help determine which system components require anti-malware protection based on current threat information and the system's exposure.

Good Practice

Evaluations should be performed at least annually and should consider the latest threat intelligence, the system's function, and its connectivity to other systems. The results and conclusions of each evaluation should be documented.

Requirement 5.2.3

Purpose

System components that are not commonly affected by malware should be periodically re-evaluated to confirm that anti-malware protection is not needed. Threats evolve, and a system that was not previously at risk may become a target.

Good Practice

Re-evaluations should be performed periodically, at a frequency defined by the entity's targeted risk analysis. If the re-evaluation determines that anti-malware protection is now needed, it should be deployed promptly.

Requirement 5.2.3.1

Purpose

The frequency of periodic re-evaluations should be based on a risk analysis that considers factors such as the threat landscape, the system's exposure, and the potential impact of a malware infection.

Good Practice

The targeted risk analysis should be documented and should define the frequency of re-evaluation. The analysis should be reviewed and updated as the threat landscape changes.

5.2: The deployed anti-malware solution(s): (a) Detects all known types of malware, (b) Removes, blocks, or contains all known types of malware.
  • Examine vendor documentation and configurations of the anti-malware solution(s) to verify that the solution: • Detects all known types of malware. • Removes, blocks, or contains all known types of malware.
Description

Requirement 5.2.1

Purpose

Anti-malware solutions provide a critical layer of defense against malicious software that can compromise system components and cardholder data. Deploying anti-malware on all system components helps ensure comprehensive protection.

Good Practice

Anti-malware solutions should be deployed on all system components that are commonly affected by malware, including servers, workstations, and mobile devices. The type of anti-malware solution should be appropriate for the operating system and environment.

Requirement 5.2.2

Purpose

Not all system components are commonly affected by malware. Periodic evaluations help determine which system components require anti-malware protection based on current threat information and the system's exposure.

Good Practice

Evaluations should be performed at least annually and should consider the latest threat intelligence, the system's function, and its connectivity to other systems. The results and conclusions of each evaluation should be documented.

Requirement 5.2.3

Purpose

System components that are not commonly affected by malware should be periodically re-evaluated to confirm that anti-malware protection is not needed. Threats evolve, and a system that was not previously at risk may become a target.

Good Practice

Re-evaluations should be performed periodically, at a frequency defined by the entity's targeted risk analysis. If the re-evaluation determines that anti-malware protection is now needed, it should be deployed promptly.

Requirement 5.2.3.1

Purpose

The frequency of periodic re-evaluations should be based on a risk analysis that considers factors such as the threat landscape, the system's exposure, and the potential impact of a malware infection.

Good Practice

The targeted risk analysis should be documented and should define the frequency of re-evaluation. The analysis should be reviewed and updated as the threat landscape changes.

5.2: Any system components that are not at risk for malware are evaluated periodically to include the following: (a) A documented list of all system components not at risk for malware, (b) Identification and evaluation of evolving malware threats for those system components, (c) Confirmation whether such system components continue to not require anti-malware protection.
  • Examine documented policies and procedures to verify that a process is defined for periodic evaluations of any system components that are not at risk for malware that includes all elements specified in this requirement.
  • Interview personnel to verify that the evaluations include all elements specified in this requirement.
  • Examine the list of system components identified as not at risk of malware and compare to the system components without an anti-malware solution deployed per Requirement 5.2.1 to verify that the system components match for both requirements.
Description

Requirement 5.2.1

Purpose

Anti-malware solutions provide a critical layer of defense against malicious software that can compromise system components and cardholder data. Deploying anti-malware on all system components helps ensure comprehensive protection.

Good Practice

Anti-malware solutions should be deployed on all system components that are commonly affected by malware, including servers, workstations, and mobile devices. The type of anti-malware solution should be appropriate for the operating system and environment.

Requirement 5.2.2

Purpose

Not all system components are commonly affected by malware. Periodic evaluations help determine which system components require anti-malware protection based on current threat information and the system's exposure.

Good Practice

Evaluations should be performed at least annually and should consider the latest threat intelligence, the system's function, and its connectivity to other systems. The results and conclusions of each evaluation should be documented.

Requirement 5.2.3

Purpose

System components that are not commonly affected by malware should be periodically re-evaluated to confirm that anti-malware protection is not needed. Threats evolve, and a system that was not previously at risk may become a target.

Good Practice

Re-evaluations should be performed periodically, at a frequency defined by the entity's targeted risk analysis. If the re-evaluation determines that anti-malware protection is now needed, it should be deployed promptly.

Requirement 5.2.3.1

Purpose

The frequency of periodic re-evaluations should be based on a risk analysis that considers factors such as the threat landscape, the system's exposure, and the potential impact of a malware infection.

Good Practice

The targeted risk analysis should be documented and should define the frequency of re-evaluation. The analysis should be reviewed and updated as the threat landscape changes.

5.2: The frequency of periodic evaluations of system components identified as not at risk for malware is defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.
  • Examine the entity’s targeted risk analysis for the frequency of periodic evaluations of system components identified as not at risk for malware to verify the risk analysis was performed in accordance with all elements specified in Requirement 12.3.1.
  • Examine documented results of periodic evaluations of system components identified as not at risk for malware and interview personnel to verify that evaluations are performed at the frequency defined in the entity’s targeted risk analysis performed for this requirement.
Description

Requirement 5.2.1

Purpose

Anti-malware solutions provide a critical layer of defense against malicious software that can compromise system components and cardholder data. Deploying anti-malware on all system components helps ensure comprehensive protection.

Good Practice

Anti-malware solutions should be deployed on all system components that are commonly affected by malware, including servers, workstations, and mobile devices. The type of anti-malware solution should be appropriate for the operating system and environment.

Requirement 5.2.2

Purpose

Not all system components are commonly affected by malware. Periodic evaluations help determine which system components require anti-malware protection based on current threat information and the system's exposure.

Good Practice

Evaluations should be performed at least annually and should consider the latest threat intelligence, the system's function, and its connectivity to other systems. The results and conclusions of each evaluation should be documented.

Requirement 5.2.3

Purpose

System components that are not commonly affected by malware should be periodically re-evaluated to confirm that anti-malware protection is not needed. Threats evolve, and a system that was not previously at risk may become a target.

Good Practice

Re-evaluations should be performed periodically, at a frequency defined by the entity's targeted risk analysis. If the re-evaluation determines that anti-malware protection is now needed, it should be deployed promptly.

Requirement 5.2.3.1

Purpose

The frequency of periodic re-evaluations should be based on a risk analysis that considers factors such as the threat landscape, the system's exposure, and the potential impact of a malware infection.

Good Practice

The targeted risk analysis should be documented and should define the frequency of re-evaluation. The analysis should be reviewed and updated as the threat landscape changes.

5.3: The anti-malware solution(s) is kept current via automatic updates.
  • Examine anti-malware solution(s) configurations, including any master installation of the software, to verify the solution is configured to perform automatic updates.
  • Examine system components and logs, to verify that the anti-malware solution(s) and definitions are current and have been promptly deployed
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.3: The anti-malware solution(s): (a) Performs periodic scans and active or real-time scans. OR, (b) Performs continuous behavioral analysis of systems or processes.
  • Examine anti-malware solution(s) configurations, including any master installation of the software, to verify the solution(s) is configured to perform at least one of the elements specified in this requirement.
  • Examine system components, including all operating system types identified as at risk for malware, to verify the solution(s) is enabled in accordance with at least one of the elements specified in this requirement.
  • Examine logs and scan results to verify that the solution(s) is enabled in accordance with at least one of the elements specified in this requirement.
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.3: If periodic malware scans are performed to meet Requirement 5.3.2, the frequency of scans is defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.
  • Examine the entity’s targeted risk analysis for the frequency of periodic malware scans to verify the risk analysis was performed in accordance with all elements specified in Requirement 12.3.1.
  • Examine documented results of periodic malware scans and interview personnel to verify scans are performed at the frequency defined in the entity’s targeted risk analysis performed for this requirement.
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.3: For removable electronic media, the anti- malware solution(s): (a) Performs automatic scans of when the media is inserted, connected, or logically mounted, OR, (b) Performs continuous behavioral analysis of systems or processes when the media is inserted, connected, or logically mounted.
  • Examine anti-malware solution(s) configurations to verify that, for removable electronic media, the solution is configured to perform at least one of the elements specified in this requirement.
  • Examine system components with removable electronic media connected to verify that the solution(s) is enabled in accordance with at least one of the elements as specified in this requirement.
  • Examine logs and scan results to verify that the solution(s) is enabled in accordance with at least one of the elements specified in this requirement.
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.3: Audit logs for the anti-malware solution(s) are enabled and retained in accordance with Requirement 10.5.1.
  • Examine anti-malware solution(s) configurations to verify logs are enabled and retained in accordance with Requirement 10.5.1.
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.3: Anti-malware mechanisms cannot be disabled or altered by users, unless specifically documented, and authorized by management on a case-by-case basis for a limited time period.
  • Examine anti-malware configurations, to verify that the anti-malware mechanisms cannot be disabled or altered by users.
  • Interview responsible personnel and observe processes to verify that any requests to disable or alter anti-malware mechanisms are specifically documented and authorized by management on a case-by-case basis for a limited time period. Anti-malware mechanisms cannot be modified by unauthorized personnel.
Description

Requirement 5.3.1

Purpose

Keeping anti-malware solutions current ensures they can detect and protect against the latest known malware threats. Anti-malware that is not updated may fail to detect newer malware variants.

Good Practice

Anti-malware solutions should be configured for automatic updates. The update process should be monitored to ensure updates are being applied successfully.

Requirement 5.3.2

Purpose

Periodic scans and active or real-time scanning provide complementary protection. Real-time scanning detects malware as it is introduced, while periodic scans can detect malware that may have been missed or introduced before real-time scanning was active.

Good Practice

Both periodic and real-time scanning should be enabled where supported. If continuous behavioral analysis is used as an alternative to periodic or real-time scans, it should be capable of detecting known and unknown malware.

Requirement 5.3.3

Purpose

Removable electronic media can introduce malware into the environment if not scanned. Scanning removable media when inserted helps prevent malware from being introduced through this vector.

Good Practice

Anti-malware solutions should be configured to automatically scan removable media when it is inserted, connected, or mounted. If automatic scanning is not feasible, removable media should be scanned manually before use.

Requirement 5.3.4

Purpose

Audit logs of anti-malware activity provide evidence that the solution is functioning properly and can help in investigating security incidents. Without logs, it may be impossible to determine when malware was detected or whether it was successfully removed.

Good Practice

Anti-malware logs should capture scan results, updates, and any detected malware. Logs should be retained in accordance with Requirement 10.7 and should be reviewed regularly.

Requirement 5.3.5

Purpose

If users can disable anti-malware solutions, systems are left vulnerable to malware attacks. Preventing users from disabling or altering anti-malware settings helps ensure continuous protection.

Good Practice

Anti-malware solutions should be configured so that they cannot be disabled or altered by users. If there is a legitimate business need to temporarily disable anti-malware, a formal process should be in place requiring management approval, and the solution should be re-enabled as soon as possible.

Examples

Management-authorized exceptions might include situations where anti-malware interferes with a specific business process. In such cases, the exception should be time-limited, documented, and approved by management on a case-by-case basis.

5.4: Processes and automated mechanisms are in place to detect and protect personnel against phishing attacks.
  • Observe implemented processes and examine mechanisms to verify controls are in place to detect and protect personnel against phishing attacks.
Description

Requirement 5.4.1

Purpose

Phishing attacks are a common method used by attackers to trick personnel into revealing credentials, clicking malicious links, or opening malicious attachments. Anti-phishing mechanisms help protect personnel against these attacks and reduce the risk of credential theft or malware infection.

Good Practice

Organizations should implement both technical and organizational anti-phishing measures. Technical measures may include email filtering, URL filtering, and browser-based protections. Organizational measures include security awareness training focused on identifying and reporting phishing attempts.

Examples

Technical anti-phishing mechanisms include server-side email filtering to detect and block phishing emails, DMARC/DKIM/SPF email authentication, URL rewriting and time-of-click analysis, and browser extensions that warn users about known phishing sites.