NIST 800-53 REV 5 • SYSTEM AND COMMUNICATIONS PROTECTION

SC-26(1)Detection of Malicious Code

CMMC Practice Mapping

No direct CMMC mapping

NIST 800-171 Mapping

No direct NIST 800-171 mapping

Related Controls

No related controls listed

Practitioner Notes

Use decoy components specifically designed to detect malicious code — malware that interacts with the decoy reveals itself.

Example 1: Deploy canary files in directories commonly targeted by ransomware. Create hidden files named with patterns ransomware typically targets (like budget.xlsx). Monitor these files — if they are encrypted or modified, you have an immediate ransomware indicator.

Example 2: Set up a deception platform (like Attivo or Illusive Networks) that deploys fake credentials, fake network shares, and fake services throughout your environment. Malware that harvests credentials or scans for open shares interacts with the decoys and triggers an alert.