Episode 57 — A.8.7–8.8 — Anti-malware; Technical vulnerability management
A.8.7 mandates protection against malware across endpoints, servers, email, and web gateways, recognizing that modern threats blend commodity payloads with living-off-the-land techniques. For the exam, differentiate signature detection from behavioral and memory-based approaches, and tie control selection to asset criticality and operating contexts such as OT or isolated environments. Effective anti-malware programs enforce least privilege, application control, macro restrictions, and safe defaults, while sustaining telemetry for rapid triage. They also define quarantine, rollback, and containment procedures that integrate with incident response. Candidates should note that success depends on hygiene—patching, browser hardening, script control—and on user enablement so that suspicious prompts or attachments are reported quickly via defined channels for event intake.
A.8.8 requires a disciplined technical vulnerability management process that identifies, evaluates, and remediates weaknesses in software, firmware, configurations, and dependencies. Exam focus includes asset-driven scanning coverage, risk-based prioritization (CVSS context plus exploitability and business impact), service-level targets by severity, and verification of fixes through rescans or validation tests. Programs must account for third-party advisories, SBOM visibility, and emergency out-of-band patches, with waiver processes for cases where remediation is not immediately feasible. Pitfalls include stale inventories, scan gaps in cloud or container layers, and ticket backlogs that outpace risk appetite. Mature implementations integrate scanning with CI/CD, use compensating controls like WAF rules or feature flags, and track metrics such as time-to-remediate and repeat findings. Candidates should be ready to connect anti-malware and vulnerability management as complementary defenses—one catching active exploitation, the other shrinking attack surface—both supported by accurate inventories and continuous monitoring. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.