🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Secure Remote Maintenance: Tools, Techniques, and Personnel Controls for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.2

Practical guidance for implementing secure, auditable remote maintenance that protects CUI and meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (MA.L2-3.7.2) requirements.

•
April 15, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Remote maintenance is necessary for modern IT operations but is also a high-risk activity when Controlled Unclassified Information (CUI) is involved; MA.L2-3.7.2 requires organizations to ensure remote maintenance is performed securely, with controls for authentication, authorization, monitoring, and personnel vetting—this post gives small businesses concrete tools, techniques, and personnel controls to meet those compliance obligations.

What MA.L2-3.7.2 expects (practical interpretation for Compliance Framework)

At a practical level for NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2, MA.L2-3.7.2 expects that remote maintenance access to systems that store, process, or transmit CUI is: (1) limited to authorized personnel; (2) granted only through hardened, auditable channels; (3) time-limited and monitored; and (4) supported by written agreements and personnel controls for outsourced vendors. For a small business this means you must avoid ad-hoc TeamViewer-style access with persistent credentials and instead implement an approved, auditable workflow that produces logs and session records suitable for audits.

Tools you should deploy

Choose enterprise-grade, auditable solutions and avoid unmanaged remote-access tools. Recommended tooling stack: (a) an access gateway or bastion (e.g., AWS Systems Manager Session Manager, Teleport, Azure Bastion, or a hardened OpenSSH jump host) to broker sessions without exposing management ports; (b) Privileged Access Management (PAM) such as CyberArk / Delinea / BeyondTrust for credential vaulting and just-in-time privilege elevation; (c) MFA and SSO (Okta, Azure AD) to enforce strong authentication; (d) session recording and audit capture (telemetry to Splunk/Graylog or built-in session recording in bastion/PAM); (e) endpoint and network IPS/IDS and DLP to detect exfiltration. For Windows RDP, use an RD Gateway with NLA + MFA and do not expose TCP/3389 to the internet; for SSH, require public-key or certificate-based auth and disable password logins (sshd_config: PasswordAuthentication no, PermitRootLogin no, TrustedUserCAKeys /etc/ssh/ca.pub).

Techniques and implementation details

Implement least-privilege, ephemeral access, and strict session controls. Practical steps: (1) Configure a ticket-driven access workflow (ServiceNow/Jira) where tickets include scope, duration, and approval; (2) Integrate tickets with PAM to issue time-limited credentials—use HashiCorp Vault or PAM APIs to create credentials that expire automatically; (3) Use mutual TLS or SSH certificates so credentials are non-replayable—example SSH approach: set up an internal CA and configure sshd to accept certs via TrustedUserCAKeys, sign keys for an hour; (4) Ensure all sessions are recorded and logs (authentication, command history, file transfer events) are forwarded to your SIEM with 90+ day retention to support audits; (5) Encrypt remote connections with TLS 1.2+ or SSH and validate server certificates to avoid man-in-the-middle risks.

Concrete configuration examples

Small-business practicals: For Linux servers, in /etc/ssh/sshd_config set PasswordAuthentication no, PermitRootLogin no, PubkeyAuthentication yes and add TrustedUserCAKeys /etc/ssh/ca.pub. Issue short-lived certs using your CA and enforce forced commands or restricted shells for maintenance accounts. For Windows, place servers behind an RD Gateway, enable Network Level Authentication, require Azure AD or SAML-based MFA, and use Microsoft’s Just-In-Time (JIT) access via Azure AD Privileged Identity Management for temporary elevation. Forward logs via Rsyslog/Winlogbeat to a managed SIEM such as Splunk or Elastic.

Personnel controls and vendor management

MA.L2-3.7.2 also requires controls on who can perform maintenance. For internal staff: perform background checks appropriate to your risk level, enforce role-based access control (RBAC), require annual security training, signed NDAs, and documented approvals for privilege elevation. For vendors: require written contracts that mandate: limited scope, time-boxed remote access, MFA, session recording, access only through your bastion/PAM, and proof of personnel vetting. Maintain a vendor maintenance registry listing vendor staff, approved access windows, and ticket references for each session.

Real-world small-business scenario

Example: A 50-person engineering firm hosts project servers containing DoD subcontractor CUI and uses a managed-service provider (MSP) for weekend maintenance. Implement an access model where the MSP must request a maintenance ticket in the firm’s ticketing system; the ticket auto-triggers PAM to issue a one-hour SSH certificate and creates a scheduled session on the bastion. The session is recorded and forwarded to the firm’s SIEM. After the window, the certificate expires and PAM revokes any remaining privileges. If the MSP needs repeated access, each event is logged and tied to a contract clause requiring annual background checks and breach notification timelines.

Risks and consequences of not implementing these controls

Failure to secure remote maintenance exposes you to credential theft, lateral movement, and exfiltration of CUI. A single unmanaged remote session can allow attackers to install persistent malware or siphon data undetected. Noncompliance risks include loss of DoD contracts, contractual penalties, regulatory fines, and severe reputational damage. Technically, the absence of session logging and time-limited credentials makes incident response and forensic analysis slow and incomplete, increasing recovery cost and may lead to mandatory breach reporting.

Compliance tips and best practices

Practical compliance tips: (1) Treat remote maintenance as high-risk change and require change-control entries for all sessions; (2) Use automation—link ticketing, PAM, and bastion to remove manual steps and reduce error; (3) Retain logs off-host and enforce immutable storage for audit trails; (4) Test your emergency break-glass procedures and ensure break-glass credentials are tightly controlled and monitored; (5) Keep a minimal list of maintenance accounts, rotate keys/certificates regularly, and document all remote-access policies in your System Security Plan (SSP) and incident response plan to satisfy CMMC/NIST assessors.

Summary: To meet MA.L2-3.7.2 you must combine hardened tools (bastions, PAM, MFA), concrete techniques (ephemeral credentials, session recording, ticketed approvals), and personnel controls (vetting, contracts, RBAC) into an auditable workflow that limits and monitors remote maintenance—doing so reduces risk to CUI and positions a small business to demonstrate compliance during assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes