MA.L2-3.7.2

  • Requirement

    Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance.

  • Discussion

    This requirement addresses security-related issues with maintenance tools that are not within the organizational system boundaries that process, store, or transmit CUI, but are used specifically for diagnostic and repair actions on those systems. Organizations have flexibility in determining the controls in place for maintenance tools, but can include approving, controlling, and monitoring the use of such tools. Maintenance tools are potential vehicles for transporting malicious code, either intentionally or unintentionally, into a facility and into organizational systems. Maintenance tools can include hardware, software, and firmware items, for example, hardware and software diagnostic test equipment and hardware and software packet sniffers.

More Info

  • Title

    System Maintenance Control
  • Domain

    Maintenance
  • CMMC Level

    2
  • Related NIST 800-171 ID

  • Related NIST 800-53 ID

    MA-2;MA-3;MA-3(1);MA-3(2)

  • DoD Scoring Methodology Points

    5

  • Reference Documents

    • N/A

  • Further Discussion

    Tools used to perform maintenance must remain secure so they do not introduce viruses or other malware into your system. Controlling your maintenance techniques prevents intentional or unintentional harm to your network and systems. Additionally, the personnel responsible for maintenance activities should be supervised considering their elevated privilege on company assets.

    Example

    You are responsible for maintenance activities on your companyā€™s machines. To avoid introducing additional vulnerability into the systems you are maintaining, you make sure that all maintenance tools are approved and their usage is monitored and controlled [a,b]. You ensure the tools are kept current and up-to-date [a]. You and your backup are the only people authorized to use these tools and perform system maintenance [d].

    Potential Assessment Considerations

    • Are physical or logical access controls used to limit access to maintenance tools to authorized personnel [a]?
    • Are physical or logical access controls used to limit access to system documentation and organizational maintenance process documentation to authorized personnel [b]?
    • Are physical or logical access controls used to limit access to automated mechanisms (e.g., automated scripts, scheduled jobs) to authorized personnel [c]?
    • Are physical or logical access controls used to limit access to the system entry points that enable maintenance (e.g., administrative portals, local and remote console access, and physical equipment panels) to authorized personnel [d]?

NIST 800-171A Assessment Guidance

CMMC Training

Our CMMC Overview Course simplifies CMMC. Enroll so you can make informed decisions!