🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Maintenance Access and Audit Policy (with Templates) — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.2

Step-by-step guidance and ready-to-use templates to create a maintenance access and audit policy that meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.2 requirements for small and growing organizations.

April 11, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Maintenance access and audit controls are often overlooked until an incident or audit exposes weaknesses — MA.L2-3.7.2 (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2) requires your organization to control, authorize, and audit maintenance activities so that repair, upgrade, and vendor support do not become paths for compromise; this post gives practical steps, technical specifics, and ready-to-use templates to build a compliant policy for a small business.

What MA.L2-3.7.2 requires (practical interpretation)

At a practical level for a Compliance Framework implementation, MA.L2-3.7.2 means: define who may perform maintenance, require pre-approval and documented justification, limit and time-bound any privileged or remote maintenance access, log all maintenance sessions, and preserve audit evidence for review. The objective is to ensure maintenance activities don't bypass security controls or lead to exfiltration of Controlled Unclassified Information (CUI) or other sensitive assets. Your policy must cover in-person and remote maintenance, third-party vendors, use of temporary accounts, and where/how audit records are stored.

How to build the policy — step-by-step

Start with a concise scope (systems, environments, and data types — e.g., production servers, network appliances, CUI repositories). Define roles and responsibilities: System Owner, Information System Security Manager (ISSM), Maintenance Approver (often a change manager), and the Maintenance Operator (internal or vendor technician). Require a formal Maintenance Access Request (MAR) with fields for business justification, planned start/end times, maintenance tools to be used, and approvals. Integrate MAR with your change control or ticketing system (Jira, ServiceNow, or even a controlled shared spreadsheet for micro-businesses) and make approvals auditable (digital signatures or ticket logs).

Authorization and access controls

Implement least privilege and Just-In-Time (JIT) access: use a Privileged Access Management (PAM) solution or a vault (HashiCorp Vault, CyberArk, or even Azure AD Just-In-Time) to issue temporary credentials. Prohibit shared/anonymous accounts; require unique, account-based credentials and MFA for any remote or privileged session. Remote RDP/SSH must tunnel over VPN or require a bastion host/jumpbox with session recording enabled. For vendor remote sessions, require pre-approved scope, customer liaison on the call, and explicit start/stop times enforced by the ticketing workflow.

Technical logging, monitoring, and evidence retention

Define the technical audit controls: forward Windows event logs (Event ID sets for login/logoff, account elevation, service start/stop) via Windows Event Forwarding to a collector, enable auditd on Linux (track exec, auth, and file changes and capture command-line parameters), and ship syslog to a central SIEM (Splunk, Elastic, Azure Sentinel). Enable session recording for SSH (ttyrec/Asciinema or PAM integrations) and RDP (gateway recording or commercial remote access tools that capture video and keystrokes if permitted). Configure NTP across devices for consistent timestamps, enable TLS 1.2+ for management channels, and enable tamper-evident storage (WORM buckets or write-once S3 lifecycle with object lock) for audit logs. Recommended retention: keep maintenance logs and session recordings for at least 1 year for contractual and investigative needs; shorter-term system logs (e.g., 90 days) can be rolled into long-term storage after parsing/aggregation.

Templates you can drop into your program

Maintenance Access Request (MAR) — fields: Request ID; Requestor; System/Asset ID; Business Justification; Start/End Time; Maintenance Type (hardware/software/configuration); Tools/Protocols (SSH/RDP/console); Vendor Name (if applicable); Approved By (Name/Role/Date); Ticket/Change ID; Post-Maintenance Report Link. Maintenance Session Log (audit) — fields: Session ID; Start/Stop Timestamps (UTC); Operator Account; Source IP/Hostname; Target Asset; Actions Performed (high-level); Files Transferred (Y/N + list); Session Recording Location; Hash of Recording/Log; Approver Reference. Post-Maintenance Report — fields: Summary of work; Rollback steps; Verification checks performed; Vulnerability/Config changes; Follow-up actions; Evidence attachments (logs, screenshots, recordings).

Embed these templates into your ticketing system so submission, approval, and archival are automatic: require the MAR to exist before any access is granted, tie PAM session creation to the ticket, and attach session logs and the post-maintenance report to the ticket at closure. For very small shops without PAM, enforce strict procedures: create single-use credentials in a password manager, document issuance in the ticket, and purge credentials immediately after the maintenance window.

Real-world small-business scenarios

Example 1: A small IT MSP performing router firmware updates for a defense contractor client — require the MSP to submit a MAR with firmware hashes, use a VPN + bastion access, record the console session, and get approval from the client's ISSM before starting. Example 2: A startup vendor needs database schema migration — the DB admin must request a JIT elevated role through the PAM and attach a rollback plan; after the migration run automated smoke tests and capture DB audit logs for the migration period. Example 3: Emergency hotfix after hours — allow emergency maintenance under policy but require retrospective MAR within 24 hours, mandatory session recording, and expedited review by the ISSM the next business day.

Compliance tips, checks, and best practices

Automate as much evidence collection as possible: integrate tickets with PAM and SIEM so logs, session recordings, and approval metadata are linked. Enforce time-bound approvals, require multi-person approval for high-risk systems, and run periodic audits of temporary accounts and session logs (monthly). Regularly test your log collection pipeline (simulate a maintenance session and ensure logs/recordings appear in the SIEM and attach to the ticket). Keep a mapping document that links each MAR/ticket to relevant CMMC/NIST controls and expected artifacts so auditors can quickly find proof. Train vendor contacts on your maintenance rules and include maintenance clauses in vendor contracts (scope, logging, liability, and data handling).

Risks of not implementing MA.L2-3.7.2

Without controlled maintenance access and auditability you risk: unauthorized persistent access (backdoors), data exfiltration during legitimate-sounding maintenance, misconfiguration leading to outages, and lack of evidence during incident response. Noncompliance can lead to failed CMMC assessments, loss of DoD contracts, regulatory fines, and reputational harm. In short, maintenance is a high-risk activity that must be auditable and constrained to avoid turning a fix into a breach.

Summary: Build a clear, scoped Maintenance Access and Audit Policy that mandates pre-approved maintenance requests, role-based and time-limited access, centralized logging and session recording, and retention/attestation of evidence; use the provided templates (MAR, Session Log, Post-Maintenance Report), integrate with your ticketing/PAM/SIEM, and enforce vendor controls — these practical measures will help a small business meet MA.L2-3.7.2 requirements under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 while reducing real operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes