5.2.1 An anti-malware solution(s) is deployed on all system components, except for those system components identified in periodic evaluations per Requirement 5.2.3 that concludes the system components are not at risk from malware.
Defined Approach Requirements
5.2.1 An anti-malware solution(s) is deployed on all system components, except for those system components identified in periodic evaluations per Requirement 5.2.3 that concludes the system components are not at risk from malware.
Customized Approach Objective
Automated mechanisms are implemented to prevent systems from becoming an attack vector for malware.
Defined Approach Testing Procedures
5.2.1.a Examine system components to verify that an anti-malware solution(s) is deployed on all system components, except for those determined to not be at risk from malware based on periodic evaluations per Requirement 5.2.3.
5.2.1.b For any system components without an anti-malware solution, examine the periodic evaluations to verify the component was evaluated and the evaluation concludes that the component is not at risk from malware.
Purpose
There is a constant stream of attacks targeting newly discovered vulnerabilities in systems previously regarded as secure. Without an anti-malware solution that is updated regularly, new forms of malware can be used to attack systems, disable a network, or compromise data.
Good Practice
It is beneficial for entities to be aware of "zero-day" attacks (those that exploit a previously unknown vulnerability) and consider solutions that focus on behavioral characteristics and will alert and react to unexpected behavior.
Definitions
System components known to be affected by malware have active malware exploits available in the real world (not only theoretical exploits).
purpose
Deploy anti-malware solutions on all systems commonly affected by malicious software.
compliance strategies
- Automated deployment
- Coverage verification
typical policies
- Endpoint Protection Policy
common pitfalls
- Unprotected endpoints
- Missed coverage on new systems
type
Technical Control
difficulty
Moderate
key risks
- Malware infection
recommendations
- Automate deployment with endpoint management tools
Eligible SAQ
- SAQ-A-EP
- SAQ-C
- SAQ-C-VT
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy