Skip to main content
โ† All controls
CIS-10.5 / SI-7 / A.8.7 CIS Controls v8

Tamper protection enabled

Demonstrate that tamper protection mechanisms are enabled and enforced on all endpoints to prevent unauthorized modification or disabling of security software and associated configurations.

Description

What this control does

Tamper protection is a security feature that prevents unauthorized users, malware, or malicious processes from disabling or altering critical security software components such as antivirus engines, real-time scanning, behavior monitoring, and cloud-delivered protection services. This control enforces system-level or kernel-level restrictions that block attempts to stop security services, delete signature files, modify registry keys, or uninstall security agents without proper administrative authentication. Enabling tamper protection ensures that even if an attacker gains elevated privileges or deploys sophisticated malware, the endpoint security stack remains operational and continues to provide visibility and protection throughout the attack lifecycle.

Control objective

What auditing this proves

Demonstrate that tamper protection mechanisms are enabled and enforced on all endpoints to prevent unauthorized modification or disabling of security software and associated configurations.

Associated risks

Risks this control addresses

  • Malware disables antivirus or EDR agents before executing payload, evading detection and response
  • Ransomware operators terminate security processes and delete backup agents to maximize impact
  • Insider threats with administrative access disable monitoring tools to perform unauthorized activities without logging
  • Credential-stuffing or privilege-escalation attacks leverage compromised accounts to turn off endpoint protections
  • Fileless malware or living-off-the-land techniques modify registry keys or group policies to weaken security posture
  • Attackers leverage legitimate administrative tools (PowerShell, WMI, Task Scheduler) to persistently disable security services
  • Unprotected endpoints become staging grounds for lateral movement after initial compromise

Testing procedure

How an auditor verifies this control

  1. Obtain a current inventory of all managed endpoints including operating systems, installed security agents, and management consoles or platforms.
  2. Review the security software vendor's documentation to identify tamper protection features, supported platforms, and configuration requirements.
  3. Access the central management console or cloud portal for the endpoint protection platform and navigate to tamper protection policy settings.
  4. Export or screenshot the global and group-level tamper protection configurations, noting enforcement state, exclusions, and any conditional policies.
  5. Select a representative sample of at least 10 endpoints across different operating systems, organizational units, and criticality tiers for hands-on validation.
  6. Connect to each sampled endpoint and verify tamper protection status using native agent commands, registry queries, or vendor-provided diagnostic tools.
  7. Simulate tamper attempts on a controlled test endpoint by attempting to stop security services, modify protected registry keys, or uninstall the agent using administrative credentials.
  8. Review security event logs, SIEM alerts, or management console dashboards for tamper attempt detection events and verify that tamper protection blocked the actions and generated alerts.
Evidence required Configuration exports or screenshots from the endpoint protection management console showing tamper protection enabled globally and per organizational unit. Screenshots or command-line output from sampled endpoints displaying tamper protection status via agent diagnostics, PowerShell queries, or registry inspection. Security event logs or SIEM query results documenting tamper attempt detections, blocked actions, and administrative alerts generated during simulated testing.
Pass criteria Tamper protection is enabled on all in-scope managed endpoints, no unauthorized exclusions exist, simulated tamper attempts are successfully blocked, and all such attempts generate corresponding alerts in security monitoring systems.

Where this control is tested

Audit programs including this control