🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Secure Remote Maintenance Access to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.2

Practical, step-by-step guidance to secure, monitor, and document remote maintenance sessions to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 MA.L2-3.7.2 requirements.

•
April 01, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

MA.L2-3.7.2 requires organizations to control and monitor remote maintenance sessions to prevent unauthorized access, detect misuse, and provide evidence for audits; this post gives practical, actionable steps small and mid-sized organizations can implement to meet the NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirement while minimizing operational friction.

What MA.L2-3.7.2 Requires (summary and key objectives)

At its core, MA.L2-3.7.2 mandates that remote maintenance access is explicitly controlled, time-limited, auditable, and monitored. Key objectives are: authorize each maintenance session, restrict access to the minimum necessary, record or log the session activity, and retain evidence (approvals, logs, recordings) to demonstrate compliance. For organizations following the Compliance Framework, this means creating documented policies, technical enforcement points, and evidence collection procedures that map directly to the control.

Practical implementation steps for Compliance Framework

Start with policy and process: require a maintenance ticket or change request before any remote maintenance session, define roles (requestor, approver, monitor), and enforce a “no silent access” rule—no one gets standing, unmanaged remote maintenance credentials. Implement just-in-time (JIT) access where privileged accounts are created or enabled only for the duration of the maintenance window. Use change control to link each session to a ticket number and include scope, start/end times, and a named approver.

Technical controls and concrete examples

Layer technical controls: network segmentation (allow maintenance only from specific IP ranges and to specific management VLANs), bastion/jump hosts, strong authentication, endpoint protection, session recording, and centralized logging. Examples and specific tools: use an SSH bastion with key-based auth and time-limited keys (OpenSSH certificates or short-lived keys issued by a CA); for Windows use an RD Gateway or Azure Bastion with MFA and conditional access; consider AWS Systems Manager Session Manager or Google Cloud IAP to avoid opening inbound ports entirely. For privileged access management (PAM), choose a solution like CyberArk, BeyondTrust, or an open-source alternative; if resources are tight, configure an admin jump host + MFA + time-limited AD group membership using a scheduled script or Azure AD Privileged Identity Management (PIM).

Example commands and config patterns

Small technical examples you can implement quickly: configure OpenSSH to enforce command recording by wrapping shells in tlog or using ForceCommand to run a session-logger script, add an auditd rule to capture execve on /usr/bin/ssh, and forward audit logs to a centralized syslog collector (rsyslog with TLS). On Windows, enable auditing for logon/logoff and privileged activities (Event IDs 4624, 4672, 4648), forward events to a SIEM, and enable RDP over RD Gateway with Network Level Authentication plus MFA. For cloud-hosted assets, enable CloudTrail/Activity logs and configure alerts for unexpected console or session manager activity.

Small-business scenario (vendor performs urgent patch)

Scenario: an external vendor must apply a security patch to a mail server that stores Controlled Unclassified Information (CUI). Implementation: vendor submits a ticket describing scope and time; approver grants a timeboxed VPN or cloud-session link valid only for the scheduled 45-minute window; IT requires MFA and records the session with screen capture or cloud session recorder; an internal engineer observes the session and takes contemporaneous notes; after the session, the ticket is closed and the temporary account is revoked. Evidence to keep: the ticket, the approver's approval, session recording, logs from firewall/VPN, and any configuration change records.

Compliance evidence and monitoring

To satisfy auditors, retain: the supervisory approval/changeticket linked to the session, identity of the person or vendor who performed maintenance, PAM logs showing account elevation and time windows, session recordings or detailed logs, and SIEM entries that show the session and any commands executed. Maintain retention consistent with your policy—commonly 1–3 years for sensitive environments—and protect logs with integrity controls (hashing, write-once storage, or remote archive). Regularly review aggregated alerts for anomalous patterns like out-of-hours maintenance or repeated failed attempts.

Risks of not implementing MA.L2-3.7.2

Failing to control and monitor remote maintenance exposes organizations to multiple risks: unauthorized backdoor access, credential theft during unattended sessions, data exfiltration by malicious or compromised vendors, and an inability to demonstrate accountability during an incident or audit. Beyond security risks, non-compliance can jeopardize contracts that require NIST/CMMC controls, expose the organization to regulatory penalties, and damage reputation—small businesses are frequently targeted because they often lack rigorous controls.

Summary: meet MA.L2-3.7.2 by combining clear policies (ticketed approvals, role definitions), technical enforcement (bastions, JIT access, MFA, PAM), and strong evidence collection (session recordings, centralized logs, retained tickets). Start small—implement a bastion host + time-limited accounts + basic logging—then iterate toward PAM, full session recording, and SIEM integration. Document each step in your Compliance Framework mapping and keep a repeatable playbook so remote maintenance becomes secure, auditable, and defensible during assessments and incidents.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes