Keiter Technologies: CMMC Requirements for Malicious Code Protection

By Keiter CPAs

Keiter Technologies: CMMC Requirements for Malicious Code Protection

Identifying designated locations for endpoint protection

As part of a series of articles about CMMC Level 1 Practices, the Keiter Technology team discusses the first of three CMMC Level 1 requirements related to endpoint protection. CMMC Practice Guide SI.L1-3.14.2 requires organizations to identify where endpoint protection software is needed. Identifying the impact and likelihood of malware on a device will help provide a clearer picture of the risk.

The objectives of this assessment are to determine if designated locations for malicious code protection are identified and
if protection from malicious code at these designated locations is provided. To learn more about what you as a government contractor should consider to meet these objectives, read the full article here:

If you want to learn more about CMMC, Keiter’s team of cybersecurity specialists can help you. Email | Call: 804.747.0000.


Share this Insight:

About the Author

Keiter CPAs

Keiter CPAs

Keiter CPAs is a certified public accounting firm serving the audittax, accounting and consulting needs of businesses and their owners located in Richmond and across Virginia. We focus on serving emerging growth businesses and companies in the financial servicesconstructionreal estatemanufacturingretail & distribution industries and nonprofits. We also provide business valuations and forensic accounting servicesfamily office services, and inbound international services.

More Insights from Keiter CPAs

The information contained within this article is provided for informational purposes only and is current as of the date published. Online readers are advised not to act upon this information without seeking the service of a professional accountant, as this article is not a substitute for obtaining accounting, tax, or financial advice from a professional accountant.


Contact Us