🚨 CMMC Phase One started November 10! Here's everything you need to know →

Maintenance Evidence Checklist: What Auditors Look For Under NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - MA.L2-3.7.1

Practical checklist and evidence examples to demonstrate compliance with NIST SP 800-171 Rev.2 / CMMC 2.0 MA.L2-3.7.1 (Perform maintenance on organizational systems).

•
April 22, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

MA.L2-3.7.1 requires organizations to perform maintenance on their systems in a controlled, documented way; auditors will expect a clear trail showing what maintenance was planned, who authorized and performed it, how it was executed, and how the system was validated and returned to service—especially for systems that process, store, or transmit CUI under the Compliance Framework.

What auditors are verifying under MA.L2-3.7.1

Auditors interpret MA.L2-3.7.1 as evidence that maintenance is performed deliberately and consistently, not ad-hoc. They want proof that maintenance activities (patching, firmware upgrades, hardware replacement, preventive maintenance) are scheduled, authorized, logged, and verified. For CMMC/NIST, the scope centers on organizational systems that handle Controlled Unclassified Information (CUI), so evidence must show controls applied to those assets specifically.

Core evidence items auditors expect

Policies, procedures, and role assignments

Provide an up-to-date maintenance policy or SOP that defines maintenance types (routine, emergency, vendor), roles (maintenance technician, approver, system owner), and authorization requirements. Auditors will look for a documented maintenance procedure that maps responsibilities and references the systems in your asset inventory/CMDB. Small-business practical step: create a one-page maintenance SOP for each system class (servers, network devices, endpoints) and store it in your secure document repository.

Maintenance schedules and approvals

Auditors expect a schedule or calendar showing planned maintenance windows and evidence of pre-approval for each activity. Evidence can be calendar invites, change management tickets with approval fields populated, or signed emails. Implementation detail: use your ticketing/change system (e.g., Jira Service Management, ServiceNow, Freshservice) with required fields like "system impacted," "CUI involved," "rollback plan," and "approver signature" to standardize evidence capture.

Work orders, execution logs, and artifacts

Provide work orders or change tickets showing start/end times, technician identity, commands run, and outcome. Technical artifacts are critical: console logs, patch-management job output (SCCM/WSUS/Intune job reports), syslog/journalctl entries, and package manager logs (/var/log/dpkg.log, /var/log/yum.log). For Windows, auditors commonly accept Event Log entries (e.g., service installs such as Event ID 7045, scheduled task creation Event ID 4698) and SCCM deployment reports. Include screenshots or exported CSVs from tools when possible to show timestamps and hashes.

Post-maintenance verification and rollback documentation

Auditors want validation that maintenance didn't break systems and that fallback options exist. Provide test results, monitoring alerts cleared, user acceptance signoffs, and rollback procedures executed when needed. Technical validation can include service health checks, automated smoke test results, successful index of backup restores, or BMC/monitoring graphs showing normal CPU/memory post-maintenance. Keep rollback logs or scripts and show they were tested in staging.

Third-party and remote maintenance controls

When vendors perform maintenance, auditors expect contracts, SOWs, proof of authorization for each session, and session logs. For remote maintenance, provide remote access logs, bastion/jump-host session recordings, MFA evidence, and just-in-time privileged access records. Practical technical setup: require SSH via an isolated bastion host with recorded session, or RDP through gateway with Azure AD conditional access and audit logging enabled. Evidence should show the vendor account used, the time window, and the actions taken.

Small business examples and implementation tips

Example A: A 20-person defense subcontractor uses an MSP for patching. Evidence bundle: the MSP's monthly maintenance report (PDF), the subcontractor's change ticket approving the monthly window, SCCM deployment report for the patch batch, system uptime graphs after the patch, and an email from the MSP confirming completion. Example B: A small software shop performing firmware updates on network gear—evidence includes pre-maintenance backup configs, a signed change ticket that names the devices (matching the CMDB asset IDs), the executed CLI command log (copied from the terminal or captured via automation tool like Ansible), and a post-update config diff proving the change.

Risks of not implementing MA.L2-3.7.1 and best practices

Failure to maintain systems properly exposes you to unpatched vulnerabilities, unexpected outages, data loss, and unauthorized changes—risks that can lead to CUI exposure, contract loss, and failed audits. Best practices: automate patch orchestration and evidence collection where possible (SCCM, Intune, Ansible), centralize logs (SIEM or log aggregator) with immutable storage, enforce change approvals, and establish retention policies (align with contract requirements; many organizations retain maintenance logs 1–3 years). Also perform periodic audits of your maintenance process, and run tabletop exercises for emergency maintenance scenarios.

In summary, convincing auditors you meet MA.L2-3.7.1 requires a consistent, documented pipeline from policy and approvals through execution and verification, with concrete artifacts—tickets, logs, test results, and contracts—mapped back to the systems that handle CUI; small businesses can meet this bar by standardizing SOPs, using ticketing and automation tools to capture evidence, and keeping a central, tamper-resistant repository of maintenance records.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes