🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.6

Practical guide for SMBs to implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.6

January 06, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.6 – Supervise the maintenance activities of personnel without required access authorization.

Understanding the Requirement

This control requires that any person who does not normally have maintenance access to your systems be supervised while performing maintenance tasks, and that their access be limited and time-bound where possible. The objective is to ensure maintenance personnel without required access authorization are supervised during maintenance activities; in practice this means escorting or actively monitoring temporary access, issuing accounts that expire, and treating third-party or ad-hoc maintenance as a higher-risk activity that needs oversight.

Technical Implementation

  • Formalize temporary access procedures. Create a simple access request and approval workflow (ticket or form) that records the reason, scope, start/end times, and approving manager for any temporary maintenance access. Require approval before accounts are created or elevated.
  • Issue time-limited accounts or credentials. Use accounts with explicit expiration dates/times for all temporary maintenance users. For local accounts on servers, set the account to auto-expire at the end of the maintenance window. If you use IAM or Active Directory, set temporary group memberships that automatically drop at expiration.
  • Enforce least privilege for maintenance tasks. Grant only the privileges required for the specific maintenance job. Avoid broad administrator access; use role-scoped accounts or temporary sudo/jump-account mechanisms so elevated rights are constrained to the necessary systems and commands.
  • Supervise and monitor sessions. Assign a named employee to supervise each maintenance activity. Supervision can be physical (escort in the server room) or technical (remote screen sharing, session recording, or a jump host with session logging). Ensure logs capture who initiated the session, commands executed, and timestamps.
  • Record and retain evidence. Enable audit logging for maintenance sessions and retain logs for an appropriate period (aligned with your incident response / compliance policy). Store the maintenance ticket, supervisor name, start/end times, and session logs together so you can review what was done if needed.
  • Use contractual and administrative controls for third parties. Require consultants and vendors to sign maintenance access agreements that specify supervision, confidentiality, and account expiration rules. Include a clause requiring the vendor to coordinate access through your request process and to accept supervision.

Example in a Small or Medium Business

A mid-sized engineering firm hires an external consultant to update firmware on a production file server. Before any access is granted, the consultant submits a maintenance request through the company’s ticketing form stating the work, date, and estimated duration. The IT manager approves the request and assigns a systems administrator to supervise. The admin creates a temporary domain account and places the consultant into a temporary “maintenance” group that expires at 17:00 the same day. During the work the supervisor joins the remote session, watches via screen sharing, and logs key actions in the ticket notes. The supervisor also ensures console access is handled through a jump host that captures the session transcript. At the end of the day the temporary account is automatically disabled, the supervisor closes the ticket with an entry summarizing actions taken, and the firm retains the session log and the signed contractor maintenance agreement for future audits. Because the process is documented and repeatable, the firm reduces risk while allowing the necessary maintenance activity to proceed.

Summary

Combining a clear administrative policy (request/approval, supervisor assignment, and vendor agreements) with practical technical controls (time-limited accounts, least privilege, supervised or recorded sessions, and retained logs) ensures maintenance personnel without normal access are properly supervised. For SMBs this approach is low-cost and effective: it limits exposure during temporary maintenance, creates an audit trail for oversight, and gives managers confidence that external or one-off maintainers cannot perform unsupervised, persistent changes to critical systems.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes