MNT-04.3: Prevent Unauthorized Removal
Mechanisms exist to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Control Question: Does the organization prevent or control the removal of equipment undergoing maintenance that contains organizational information?
General (16)
| Framework | Mapping Values |
|---|---|
| GovRAMP Moderate | MA-03(03) |
| GovRAMP High | MA-03(03) |
| NIST 800-53 R4 | MA-3(3) |
| NIST 800-53 R4 (high) | MA-3(3) |
| NIST 800-53 R5 (source) | MA-3(3) |
| NIST 800-53B R5 (moderate) (source) | MA-3(3) |
| NIST 800-53B R5 (high) (source) | MA-3(3) |
| NIST 800-82 R3 MODERATE OT Overlay | MA-3(3) |
| NIST 800-82 R3 HIGH OT Overlay | MA-3(3) |
| NIST 800-161 R1 | MA-3(3) |
| NIST 800-161 R1 Level 3 | MA-3(3) |
| NIST 800-171 R3 (source) | 03.07.04.c |
| NIST 800-171A R3 (source) | A.03.07.04.c |
| TISAX ISA 6 | 3.1.3 |
| SCF CORE ESP Level 2 Critical Infrastructure | MNT-04.3 |
| SCF CORE ESP Level 3 Advanced Threats | MNT-04.3 |
US (12)
| Framework | Mapping Values |
|---|---|
| US CJIS Security Policy 5.9.3 (source) | MA-3(3) |
| US CMS MARS-E 2.0 | MA-3(3) |
| US FedRAMP R4 | MA-3(3) |
| US FedRAMP R4 (moderate) | MA-3(3) |
| US FedRAMP R4 (high) | MA-3(3) |
| US FedRAMP R5 (source) | MA-3(3) |
| US FedRAMP R5 (moderate) (source) | MA-3(3) |
| US FedRAMP R5 (high) (source) | MA-3(3) |
| US HIPAA Administrative Simplification 2013 (source) | 164.310(d)(1) |
| US HIPAA Security Rule / NIST SP 800-66 R2 (source) | 164.310(d)(1) |
| US IRS 1075 | MA-3(3) |
| US - TX TX-RAMP Level 2 | MA-3(3) |
Americas (1)
| Framework | Mapping Values |
|---|---|
| Americas Canada ITSP-10-171 | 03.07.04.C |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Level 1 — Performed Informally
C|P-CMM1 is N/A, since a structured process is required to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Level 2 — Planned & Tracked
Maintenance (MNT) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Identify cybersecurity and data protection controls to appropriately address applicable statutory, regulatory and contractual requirements for technology asset maintenance. o Develop and disseminate formal guidance to facilitate a localized/regionalized process to implement secure and timely technology asset-specific maintenance operations, including preventative and reactionary maintenance operations.
- Technology asset maintenance is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel:
- Maintenance controls are primarily administrative in nature (e.g., policies & standards) to manage change control processes associated with maintenance operations.
- Asset custodians develop and maintain formalized procedures to conduct controlled and timely maintenance activities throughout the lifecycle of the system, application or service.
- Maintenance operations may be centralized for certain locations (e.g., datacenters) and decentralized for other locations, both in terms of change management and execution.
- Facilities management uses a localized/regionalized process to facilitate the secure and timely implementation of non-IT maintenance operations, including preventative and reactionary maintenance operations.
- Administrative processes and technologies exist to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Level 3 — Well Defined
Maintenance (MNT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- IT/cybersecurity personnel develop and disseminate formal practices to implement enterprise-wide capability to conduct secure and timely technology asset-specific maintenance operations, including preventative and reactionary maintenance operations.
- Technology asset-related maintenance operations are centralized in terms of change management and governance. Local/regional practices fall under the broader enterprise-wide technology asset maintenance program.
- Facilities management uses an enterprise-wide process to facilitate the secure and timely implementation of non-IT maintenance operations, including preventative and reactionary maintenance operations. Local/regional practices fall under the broader enterprise-wide facilities management program.
- A Change Control Board (CCB), or similar function, centrally manages the process of IT and non-IT maintenance operations to reduce the chance of business interruptions from maintenance operations.
- Administrative processes and technologies exist to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to prevent or control the removal of equipment undergoing maintenance that contains organizational information.
Assessment Objectives
- MNT-04.3_A01 personnel or roles who can authorize removal of equipment from the facility is/are defined.
- MNT-04.3_A02 the removal of system maintenance equipment containing sensitive / regulated data is prevented by verifying that there is no sensitive / regulated data on the equipment, sanitizing or destroying the equipment, or retaining the equipment within the facility.
- MNT-04.3_A03 the removal of maintenance equipment containing organizational information is prevented by sanitizing or destroying the equipment.
- MNT-04.3_A04 the removal of maintenance equipment containing organizational information is prevented by retaining the equipment within the facility.
- MNT-04.3_A05 the removal of maintenance equipment containing organizational information is prevented by obtaining an exemption from personnel or roles explicitly authorizing removal of the equipment from the facility.
- MNT-04.3_A06 the removal of system maintenance equipment containing CUI is prevented by verifying that there is no CUI on the equipment, sanitizing or destroying the equipment, or retaining the equipment within the facility.
Technology Recommendations
Micro/Small
- Physical Access Control (PAC)
Small
- Physical Access Control (PAC)
Medium
- Physical Access Control (PAC)
Large
- Physical Access Control (PAC)
Enterprise
- Physical Access Control (PAC)