118 – Inspect attachments
Summary
An anti-malware tool must scan files that are attached to an email.
Description
Malicious emails could include attachments disguised as documents, PDFs, e-files, and voicemails.
Supported In
Advanced: True
References
- CIS-9_6. Block unnecessary file types
- CWE-509. Replicating malicious code (virus or worm)
- MITRE-M1021. Restrict web-based content
- MITRE-M1049. Antivirus/antimalware
- FEDRAMP-RA-5. Vulnerability scanning
- ISO27002-8_7. Protection against malware
- ISSAF-J_4. Network security - Anti-virus system (objective)
- ISSAF-J_6_4. Network security - Anti-virus system (methodology)
- ASVS-12_4_2. File storage
- SIG-D_4_4_4. Asset and information management
- ASVS-5_2_3. Sanitization and sandboxing
- ISO27001-8_7. Protection against malware
- CASA-5_2_3. Sanitization and Sandboxing
- CASA-12_4_2. File Storage
Weaknesses
Last updated
2024/01/18