SOC 2 CC6.8: Logical and Physical Access - Prevention and Detection of Unauthorized Software
What This Control Requires
The entity implements controls to prevent or detect and act on the introduction of unauthorized or malicious software to meet the entity's objectives. The entity uses detection and prevention measures to identify and respond to malware, ransomware, and other unauthorized software installations.
In Plain Language
Malware remains one of the most common and damaging attack vectors. A single ransomware infection can take down operations for days, and a well-placed trojan can exfiltrate data for months before detection. CC6.8 is about having both the prevention and detection layers to stop this from happening.
In practice, you need anti-malware or EDR on all endpoints and servers, application control policies limiting what can be installed and run, a patch management programme that closes known vulnerabilities quickly, and monitoring across the environment for signs of malicious activity.
Auditors test this by looking at deployment coverage (are all endpoints actually protected?), update status (are signatures and agents current?), patching compliance, and incident response history. Gaps in any of these areas are common findings.
How to Implement
Deploy endpoint detection and response (EDR) or anti-malware on every endpoint - workstations, laptops, and servers. Make sure the solution provides real-time protection, behavioural analysis, and automated response. Configure automatic signature updates and use the management console to track deployment coverage and alert status.
Restrict software installation. Remove local admin rights from standard users so they can't install software without IT approval. Maintain an approved software catalogue and set up a request process for new applications. For high-security environments, consider application whitelisting.
Set up a patch management programme with clear timelines based on severity: critical patches within 14 days, high within 30, medium within 60, low within 90. Track compliance across all systems and report on patch status regularly.
Secure the most common malware delivery vector: email. Deploy filtering with anti-malware scanning, URL rewriting and sandboxing, attachment sandboxing, and anti-phishing protections. Quarantine or block anything suspicious.
Add network-based malware detection at boundary points: IDS/IPS with malware signatures, DNS filtering to block known malicious domains, and network traffic analysis to catch command-and-control communications.
Document your malware incident response procedures. Define how alerts are triaged, investigated, contained, and remediated. Make sure you can isolate infected systems quickly, preserve forensic evidence, and perform root cause analysis. Run tabletop exercises of malware scenarios regularly.
Evidence Your Auditor Will Request
- EDR/anti-malware deployment records showing coverage across all endpoints and servers
- Anti-malware solution configuration including automatic update status and scan schedules
- Application control policy and evidence of enforcement (restricted admin rights, approved software list)
- Patch management records showing compliance with defined patching timelines
- Malware incident response procedures and records of recent incidents and responses
Common Mistakes
- Anti-malware solution is not deployed on all endpoints, leaving coverage gaps on servers or specialized systems
- Malware definitions are not updated automatically, leaving systems vulnerable to recent threats
- Users have local administrator rights, enabling installation of unauthorized or malicious software
- Patch management is inconsistent, with critical vulnerabilities remaining unpatched beyond defined timelines
- Malware alerts are generated but not reviewed or investigated in a timely manner
Related Controls Across Frameworks
Frequently Asked Questions
Should we use traditional antivirus or EDR?
How do we protect Linux servers that cannot run traditional antivirus?
Should we block all USB devices?
Track SOC 2 compliance in one place
AuditFront helps you manage every SOC 2 control, collect evidence, and stay audit-ready.
Start Free Assessment