🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Draft Vendor SLAs and Contracts to Ensure Compliant Maintenance to Perform Maintenance on Organizational Systems (NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.1)

Practical guidance and sample contract/SLA language to ensure vendors perform maintenance on systems in a way that meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.1 requirements.

April 25, 2026
6 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Ensuring vendors perform maintenance on organizational systems in a compliant, auditable, and secure manner is a critical requirement under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (MA.L2-3.7.1); this post explains what to include in SLAs and contracts, gives practical language and technical controls, and shows how a small business can implement and verify those controls without overburdening operations.

Understanding MA.L2-3.7.1 and the compliance objective

MA.L2-3.7.1 requires organizations to ensure maintenance of organizational systems is performed in a controlled and secure manner. The control’s objectives are to limit unauthorized access during maintenance, ensure maintenance activities do not compromise confidentiality or integrity of Controlled Unclassified Information (CUI), provide traceability of who did what, and ensure maintenance actions are logged and verifiable. For small businesses, this means vendor maintenance must be scoped, monitored, and contractually bound to security practices aligned to your CUI protection responsibilities.

Key contract and SLA elements to include

At a minimum, contracts and SLAs with vendors who will perform maintenance should include: scope of permitted maintenance activities; required approvals and scheduling; remote access methods and controls; authentication and session management requirements; logging, evidence, and retention specifics; breach and incident notification timeframes; audit and inspection rights; subcontractor flow-down obligations; and termination remedies for non-compliance.

Sample SLA language (short, actionable clause)

Example clause you can adapt: “Vendor shall perform maintenance only on the systems and components expressly listed in Appendix A. All maintenance must be scheduled in advance and approved by the Organization’s designated System Owner unless an emergency is declared in accordance with Section X. Remote maintenance sessions must be conducted via the Organization’s managed bastion host or VPN gateway, authenticated using multi-factor authentication (MFA), recorded and forwarded to the Organization’s SIEM. Vendor must provide session logs, change records, and evidence of rollback validation within 48 hours of maintenance completion. Vendor will notify the Organization of any suspected incident within 2 hours and provide a full incident report within 72 hours.”

Technical controls and implementation notes (practical specifics)

Include precise technical requirements so the contract is enforceable. Example specifics: require remote access only through an organization-controlled bastion host (SSH jumpbox or SSM Session Manager) with session recording; mandate TLS 1.2+ (prefer TLS 1.3) for all management connections; require ephemeral credentials (AWS STS tokens, short-lived VPN accounts) with a maximum session duration (e.g., 8 hours) and immediate revocation after maintenance; require unique per-session credentials instead of shared accounts; require logging to forward to the organization’s SIEM (syslog over TLS, Windows Event Forwarding, or auditd logs) and retain records for at least one year (or the retention period required by your contract/regulator).

Logging, evidence, and acceptance criteria

Be specific about what vendor-provided artifacts constitute acceptable evidence: pre-maintenance change request, signed approval, maintenance checklist, exact commands executed (or config diffs), session recording or keystroke-level audit, post-maintenance test results, rollback steps and verification, and a written “maintenance closure” with timestamps, personnel IDs, and IM/phone contact logs. Define format (PDF or signed ticketing record), retention length (e.g., 12–36 months), and delivery method (secure upload to org portal or encrypted email).

Remote access, session control, and least privilege

Contracts should require least-privilege access for maintenance, including role-based access control (RBAC) and just-in-time (JIT) elevation. Specify acceptable remote access models: organization-managed VPN + bastion; organization-supplied remote-control tool; or vendor access via an organization-hosted temporary account. Require session recording and continuous monitoring with the ability to terminate sessions. For cloud environments, require use of time-limited IAM roles (e.g., AWS IAM role assumption with STS token duration set to minimal necessary period) and require CloudTrail/CloudWatch logs be exported to the organization’s logging environment for the session.

Subcontractors, flow-down, and background checks

Vendors commonly use subcontractors. Include flow-down clauses that bind subcontractors to the same obligations, and require the vendor to provide a subcontractor list and attestations. For personnel performing maintenance on systems that process or store CUI, require criminal background checks, employment verification, or at minimum, vendor personnel attestations and training records. Specify the level of personnel vetting required (e.g., criminal background check within the last 5 years) and how the organization will validate compliance (quarterly attestations, right-to-audit).

Notification, emergency maintenance, and incident reporting

Define normal maintenance windows and notification timelines (e.g., schedule and approval 72 hours in advance for non-emergency work). For emergency maintenance, require immediate notification to the organization’s incident manager and a documented justification afterward. Specify incident reporting timelines and contents: initial notification within 2 hours of detection, summary report within 24 hours, and a full forensic findings report within 72 hours. Require the vendor to preserve logs, memory images, and other forensic artifacts for a specified period (e.g., 90 days) and to cooperate with incident response and forensic investigations.

Risk of non-compliance and practical consequences

Failing to properly control vendor maintenance activities creates several risks: unauthorized data access and exfiltration, introduction of malicious code, misconfiguration leading to outages, and loss of forensic evidence if an incident occurs. On the compliance side, inadequate contracts can result in failed audits, loss of contracts (especially DoD), penalties, or forced remediation. For a small business, a single vendor-induced breach could mean losing the ability to handle CUI and losing key customers.

Small business scenarios and implementation examples

Scenario A — MSP patches firewall: Your MSP performs monthly patching on an on-prem firewall that routes CUI traffic. Contractually require the MSP to: use your bastion host, authenticate via MFA, provide a change request ticket before the window, record the session, provide a config diff and verify failover and rollback tests, and retain logs for 12 months. Scenario B — Cloud hosting provider maintenance: For a hosted VM containing CUI, require the provider to notify you 72 hours in advance, use organization-approved maintenance accounts, provide detailed maintenance notes, and ensure that any maintenance engineer requiring access signs your access agreement and is bound by your flow-down security terms.

Compliance tips and best practices

Practical tips: (1) Make maintenance requirements a checklist in your procurement templates so every new vendor contract includes mandatory clauses; (2) Map each contractual clause back to the specific NIST requirement (MA.L2-3.7.1) in your contract review artifact; (3) Use objective metrics in SLAs (e.g., % of sessions recorded, time-to-notify for emergency patches) and tie financial remedies to breaches; (4) Run periodic vendor audits (remote or onsite) and request sample maintenance artifacts; (5) Use automation to enforce access controls (temporary IAM roles, VPN account expiry) and log collection (centralized SIEM ingestion); (6) Practice tabletop exercises that include vendor-led maintenance to validate processes and communications.

In summary, a compliant maintenance program under MA.L2-3.7.1 requires precise contractual language, enforceable technical controls, documented evidence, flow-down to subcontractors, and clear incident/notification protocols. For small businesses, focus on implementable, measurable requirements (bastion-host access, MFA, session recording, log forwarding, retention, and right to audit) to reduce risk, make audits straightforward, and maintain your ability to handle CUI securely.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes