🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.5

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.5

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.5 – Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

Understanding the Requirement

This NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 control requires that any remote maintenance session initiated over an external network must use multifactor authentication (MFA) and that those sessions are explicitly ended when maintenance is finished. In practice this reduces the elevated risk from privileged remote logins by ensuring the person connecting proves identity with multiple factors and by preventing idle or forgotten sessions from remaining open after work is complete.

Technical Implementation

  • Enforce MFA on remote access gateways:

    Configure your VPN, remote desktop gateway, or cloud bastion (jump host) to require MFA for all accounts with maintenance privileges. Use time-based one-time passwords (TOTP), push notifications, hardware tokens, or FIDO2 keys—whichever integrates with your existing systems—to ensure a second factor is required before a session is established.

  • Use a privileged access management (PAM) or jump host:

    Route nonlocal maintenance through a centrally managed bastion or PAM broker that enforces MFA, records sessions, and brokers credentials so administrators do not log in directly to target systems. This minimizes credential exposure and provides an audit trail for session start/stop times.

  • Automatic session termination and idle timeouts:

    Set explicit session time limits and aggressive idle timeouts on remote maintenance conduits. Implement automated disconnection policies (e.g., terminate after a short idle period or at the end of a scheduled maintenance window) and require re-authentication for any reconnection.

  • Ticketing and approval for nonlocal maintenance:

    Require a documented change or maintenance ticket that includes the purpose, approver, scheduled start/end times, and the account to be used. Tie access provisioning to ticket approval and automatically revoke or disable remote access when the ticket is closed.

  • Logging, monitoring, and verification:

    Log MFA events, connection start/stop times, and session recordings (where feasible). Monitor for unusual patterns—such as after-hours maintenance or unusually long sessions—and implement alerts that trigger review if sessions aren’t closed properly.

  • Vendor and third-party controls:

    For external maintenance vendors, require one-time, time-limited access that is brokered through your PAM or jump host and protected by MFA; avoid shared or standing vendor accounts. Ensure contracts mandate session termination and provide access logs for verification.

Example in a Small or Medium Business

Acme Widgets is a 60-person SMB that hosts a handful of internal servers and a file server in a co-lo and cloud instances for key applications. When their senior system administrator, Alice, needs to perform maintenance from home she opens her company VPN client and is prompted for her password plus a push notification to a mobile authenticator app—MFA is required for all accounts in the admin group. All maintenance sessions are performed through a centrally managed jump host that brokers the connection, records the session, and enforces MFA so Alice never connects directly to target servers with raw credentials. Before her work begins Alice opens a maintenance ticket that lists the systems, start time, and expected end time; the ticket approval process automatically grants temporary access and ties session logs to the ticket. When Alice finishes, she closes the ticket and the jump host automatically terminates the session; the system also enforces a 10-minute idle timeout to catch any forgotten connections. The IT manager reviews the session logs weekly to verify sessions started and stopped as expected and flags any deviations for follow-up. External vendors follow the same process and are given one-time access that expires when the ticket closes.

Summary

Requiring MFA for nonlocal maintenance and ensuring sessions are terminated combines administrative controls (ticketing, approvals, vendor requirements) with technical controls (MFA enforcement, PAM/jump hosts, session timeouts, and logging) to reduce risk from privileged remote access. For SMBs, implementing MFA on existing VPN or remote access tools, centralizing remote maintenance through a brokered host, and automating session termination provide a practical, cost-effective path to meeting the control while keeping audit trails and minimizing credential exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes