Secure/Protect - Virus/ Malware Protection
Virus/Malware Protection solutions are designed to safeguard computer systems, networks, and devices from malicious software threats such as viruses, worms, Trojans, ransomware, spyware, and other forms of malware. These solutions play a critical role in maintaining the security and integrity of digital assets, preventing unauthorized access, data breaches and system disruptions. Such solutions help organisations to meet a subset of the requirements in the "Secure/Protect" category of CSA Cyber Essentials.
Instructions
This page helps you prepare "Solution Requirements" section in Vendor Management Portal and you will see the exact questions and flow.
🔴 Mandatory questions: Must answer "Yes" to continue
🟡 Preferred questions: Can answer either way and continue
Follow the question flow as indicated
Q1 🔴 Mandatory - Endpoint Attack Detection
Main Question: Does your solution support the detection of attacks in endpoints on the organisation's environment?
🔴 Answer: ○ Yes [Next: Q2] ○ No [⚠️ Cannot Proceed]
Q2 🔴 Mandatory - Automated Virus and Malware Scanning
Main Question: Does your solution enable virus and malware scans to detect possible cyberattacks, where scans can be configured to be automated and remain active to provide constant protection?
🔴 Answer: ○ Yes [Next: Q3] ○ No [⚠️ Cannot Proceed]
Q3 🔴 Mandatory - Automated Security Updates
Main Question: Does your solution enable auto-updates or support configuration to updates of signature files or equivalent (e.g. non-signature based machine learning solutions) to detect new malware?
Update Requirements: Updates should occur at least once daily.
🔴 Answer: ○ Yes [Next: Q4] ○ No [⚠️ Cannot Proceed]
Q4 🔴 Mandatory - Automated File Scanning
Main Question: Does your solution support the ability to automatically scan the files upon access?
Scope Requirements: This includes files and attachments downloaded from the Internet through the web browser or email, and external sources such as from portable USB drives.
🔴 Answer: ○ Yes [Next: Q5] ○ No [⚠️ Cannot Proceed]
Q5 🟡 Preferred - Cybersecurity Product Certification
Main Question: Has your solution undergone cybersecurity product certification?
🟡 Answer: ○ Yes [Next: Q6] ○ No [Next: Q7]
--
Q6 🔴 Mandatory Follow-up - Cybersecurity Product Certification - Elaboration
This question appears only if you answered "Yes" to Q5
Main Question: Please list all relevant cybersecurity certifications (e.g. Common Criteria (CC) or similar).
Click "Yes" to confirm you have completed the instructions.
🔴 Answer: ○ Yes [Next: Q7] ○ No [⚠️ Cannot Proceed]
Text Elaboration Required: [Text Box for Description/Details]
Q7 🔴 Mandatory - Professional Services Provision
Main Question: Does your company provide the following professional services:
Service Requirements: a. Installation and configuration b. Documentation of key deployment information of the solution c. Briefing for solution handover to customer
🔴 Answer: ○ Yes [Next: Q8] ○ No [⚠️ Cannot Proceed]
Q8 🔴 Mandatory - Dashboards and Reports
Main Question: Can your solution provide dashboards and reporting capabilities to track key metrics, user interactions, operational performance, or other relevant data insights across your digital solution?
Technical Requirements: Your digital solution should have one or more dashboards that provide an at-a-glance overview of key metrics/indicators with at least 4 charts/graphs to help users monitor, track and report cyber threats across networks and systems through data visualisation.
🔴 Answer: ○ Yes [Next: Q9] ○ No [⚠️ Cannot Proceed]
Q9 🟡 Preferred - AI Features
Main Question: Does your solution incorporate AI in your core features and functions?
🟡 Answer: ○ Yes [Next: Q10] ○ No [Next: Q11]
--
Q10 🔴 Mandatory Follow-up - AI Features - Elaboration
This question appears only if you answered "Yes" to Q9
Main Question: Describe your AI feature and its benefits. Examples are:
Feature Examples: a. Generate output, identify items, or provide recommendations based on training models to improve decision-making b. Recognise text, images to shorten time taken for manual inputs of forms c. Others, please specify
Click "Yes" to confirm you have completed the instructions.
🔴 Answer: ○ Yes [Next: Q11] ○ No [⚠️ Cannot Proceed]
Text Elaboration Required: [Text Box for Description/Details]
Q11 🟡 Preferred - Cybersecurity Compliance - Cyber Essentials Mark (CEM)
Main Question: Are you the Product Principal of the solution that you are submitting for pre-approval?
🟡 Answer: ○ Yes [Next: Q12] ○ No [Next: Q14]
--
Q12 🟡 Preferred - CEM for Product Principal
This question appears only if you answered "Yes" to Q11
Main Question: Has your organisation achieved CSA Cyber Essentials for ICT Vendor Mark certification or equivalent recognised cybersecurity certifications (including but not limited to Cyber Trust Mark or ISO27001) that validate the implementation of appropriate security controls against common cyber threats in your organisation and the solution you are submitting for pre-approval?
Compliance Requirements: Vendors are encouraged to comply at application and are required to meet this requirement by the Annual Review, where it will be assessed as mandatory.
Reference Information: Note: For more information on Cyber Essentials mark, please refer to https://www.csa.gov.sg/cyber-essentials/
🟡 Answer: ○ Yes [Next: Q13] ○ No [Assessment Finished]
--
Q13 🔴 Mandatory Follow-up - CEM for Product Principal - Elaboration
This question appears only if you answered "Yes" to Q12
Main Question: Please specify the following information:
Submission Requirements: i. The certificate demonstrating your organisation has attained Cyber Essentials for ICT Vendors ii. The cybersecurity certification the organisation has met iii. The scope of the certification
Please also upload a copy of the Certification and indicate the Certification Issuance Date in the date field.
Click "Yes" to confirm you have completed the instructions.
🔴 Answer: ○ Yes [Assessment Finished] ○ No [⚠️ Cannot Proceed]
Text Elaboration Required: [Text Box for Description/Details] Date of Issue Required: [Date Field] Upload Supporting Document Required: [File Upload]
Q14 🟡 Preferred - CEM for Resellers
Main Question: Has your organisation achieved CSA Cyber Essentials Mark certification or equivalent recognised cybersecurity certifications (including but not limited to Cyber Trust Mark or ISO27001) that validate the implementation of appropriate security controls against common cyber threats in your organisation and the solution you are submitting for pre-approval?
Compliance Requirements: Vendors are encouraged to comply at application and are required to meet this requirement by the Annual Review, where it will be assessed as mandatory.
Reference Information: Note: For more information on Cyber Essentials mark, please refer to https://www.csa.gov.sg/cyber-essentials/
🟡 Answer: ○ Yes [Next: Q15] ○ No [Assessment Finished]
--
Q15 🔴 Mandatory Follow-up - CEM for Resellers - Elaboration
This question appears only if you answered "Yes" to Q14
Main Question: Please specify the following information:
Submission Requirements: i. The cybersecurity certification the organisation has met ii. The scope of the certification
Please also upload a copy of the Certification and indicate the Certification Issuance Date in the date field.
Click "Yes" to confirm you have completed the instructions.
🔴 Answer: ○ Yes [Assessment Finished] ○ No [⚠️ Cannot Proceed]
Text Elaboration Required: [Text Box for Description/Details] Date of Issue Required: [Date Field] Upload Supporting Document Required: [File Upload]
Preparing for submission?
Your submission should contain screenshots and write-ups that clearly demonstrate compliance with each mandatory requirement sub-point. Contact us if you need help.
Last updated