Skip to main content

MNT-05: Remote Maintenance

MNT 9 — Critical Protect

Mechanisms exist to authorize, monitor and control remote, non-local maintenance and diagnostic activities.

Control Question: Does the organization authorize, monitor and control remote, non-local maintenance and diagnostic activities?

General (42)
Framework Mapping Values
CIS CSC 8.1 4.6
CIS CSC 8.1 IG1 4.6
CIS CSC 8.1 IG2 4.6
CIS CSC 8.1 IG3 4.6
CSA IoT SCF 2 CLS-09
GovRAMP Low MA-04
GovRAMP Low+ MA-04
GovRAMP Moderate MA-04
GovRAMP High MA-04
MPA Content Security Program 5.1 TS-2.6
NIST Privacy Framework 1.0 PR.MA-P2
NIST 800-53 R4 MA-4
NIST 800-53 R4 (low) MA-4
NIST 800-53 R4 (moderate) MA-4
NIST 800-53 R4 (high) MA-4
NIST 800-53 R5 (source) MA-4
NIST 800-53B R5 (low) (source) MA-4
NIST 800-53B R5 (moderate) (source) MA-4
NIST 800-53B R5 (high) (source) MA-4
NIST 800-82 R3 LOW OT Overlay MA-4
NIST 800-82 R3 MODERATE OT Overlay MA-4
NIST 800-82 R3 HIGH OT Overlay MA-4
NIST 800-160 3.4.13
NIST 800-161 R1 MA-4
NIST 800-161 R1 C-SCRM Baseline MA-4
NIST 800-161 R1 Flow Down MA-4
NIST 800-161 R1 Level 2 MA-4
NIST 800-161 R1 Level 3 MA-4
NIST 800-171 R2 (source) 3.7.5
NIST 800-171A (source) 3.7.5[a] 3.7.5[b]
NIST 800-171 R3 (source) 03.01.12.d 03.07.05.a 03.07.05.b 03.07.05.c
NIST 800-171A R3 (source) A.03.07.05.a[01] A.03.07.05.a[02]
PCI DSS 4.0.1 (source) 8.2.7
PCI DSS 4.0.1 SAQ A-EP (source) 8.2.7
PCI DSS 4.0.1 SAQ B-IP (source) 8.2.7
PCI DSS 4.0.1 SAQ C (source) 8.2.7
PCI DSS 4.0.1 SAQ D Merchant (source) 8.2.7
PCI DSS 4.0.1 SAQ D Service Provider (source) 8.2.7
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) MNT-05
SCF CORE ESP Level 1 Foundational MNT-05
SCF CORE ESP Level 2 Critical Infrastructure MNT-05
SCF CORE ESP Level 3 Advanced Threats MNT-05
US (24)
EMEA (5)
APAC (1)
Framework Mapping Values
APAC India SEBI CSCRF PR.MA.S2
Americas (1)
Framework Mapping Values
Americas Canada ITSP-10-171 03.01.12.D 03.07.05.A 03.07.05.B 03.07.05.C

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to authorize, monitor and control remote, non-local maintenance and diagnostic activities.

Level 1 — Performed Informally

Maintenance (MNT) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • IT personnel use an informal process to implement secure and timely technology asset-specific maintenance operations, including preventative and reactive maintenance operations.
  • Facilities management uses an informal process to facilitate the secure and timely implementation of non-IT maintenance operations, including preventative and reactive maintenance operations.
  • Maintenance operations are decentralized both in terms of change management and execution.
Level 2 — Planned & Tracked

Maintenance (MNT) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Identify cybersecurity and data protection controls to appropriately address applicable statutory, regulatory and contractual requirements for technology asset maintenance. o Develop and disseminate formal guidance to facilitate a localized/regionalized process to implement secure and timely technology asset-specific maintenance operations, including preventative and reactionary maintenance operations.

  • Technology asset maintenance is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel:
  • Maintenance controls are primarily administrative in nature (e.g., policies & standards) to manage change control processes associated with maintenance operations.
  • Asset custodians develop and maintain formalized procedures to conduct controlled and timely maintenance activities throughout the lifecycle of the system, application or service.
  • Maintenance operations may be centralized for certain locations (e.g., datacenters) and decentralized for other locations, both in terms of change management and execution.
  • Facilities management uses a localized/regionalized process to facilitate the secure and timely implementation of non-IT maintenance operations, including preventative and reactionary maintenance operations.
  • Administrative processes and technologies exist to authorize, monitor and control non-local maintenance and diagnostic activities.
  • Technologies are configured to use cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.
Level 3 — Well Defined

Maintenance (MNT) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • IT/cybersecurity personnel develop and disseminate formal practices to implement enterprise-wide capability to conduct secure and timely technology asset-specific maintenance operations, including preventative and reactionary maintenance operations.
  • Technology asset-related maintenance operations are centralized in terms of change management and governance. Local/regional practices fall under the broader enterprise-wide technology asset maintenance program.
  • Facilities management uses an enterprise-wide process to facilitate the secure and timely implementation of non-IT maintenance operations, including preventative and reactionary maintenance operations. Local/regional practices fall under the broader enterprise-wide facilities management program.
  • A Change Control Board (CCB), or similar function, centrally manages the process of IT and non-IT maintenance operations to reduce the chance of business interruptions from maintenance operations.
  • Administrative processes and technologies exist to authorize, monitor and control non-local maintenance and diagnostic activities.
  • Technologies are configured to use cryptographic mechanisms to protect the integrity and confidentiality of non-local maintenance and diagnostic communications.
Level 4 — Quantitatively Controlled

Maintenance (MNT) efforts are metrics driven and provide sufficient management insight (based on a quantitative understanding of process capabilities) to predict optimal performance, ensure continued operations and identify areas for improvement. In addition to CMM Level 3 criteria, CMM Level 4 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Metrics reporting includes quantitative analysis of Key Performance Indicators (KPIs).
  • Metrics reporting includes quantitative analysis of Key Risk Indicators (KRIs).
  • Scope of metrics, KPIs and KRIs covers organization-wide cybersecurity and data protection controls, including functions performed by third-parties.
  • Organizational leadership maintains a formal process to objectively review and respond to metrics, KPIs and KRIs (e.g., monthly or quarterly review).
  • Based on metrics analysis, process improvement recommendations are submitted for review and are handled in accordance with change control processes.
  • Both business and technical stakeholders are involved in reviewing and approving proposed changes.
Level 5 — Continuously Improving

Maintenance (MNT) efforts are “world-class” capabilities that leverage predictive analysis (e.g., machine learning, AI, etc.). In addition to CMM Level 4 criteria, CMM Level 5 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Stakeholders make time-sensitive decisions to support operational efficiency, which may include automated remediation actions.
  • Based on predictive analysis, process improvements are implemented according to “continuous improvement” practices that affect process changes.

Assessment Objectives

  1. MNT-05_A01 nonlocal maintenance and diagnostic activities are approved.
  2. MNT-05_A02 nonlocal maintenance and diagnostic activities are monitored.
  3. MNT-05_A03 the use of nonlocal maintenance and diagnostic tools are allowed only as consistent with organizational policy.
  4. MNT-05_A04 the use of nonlocal maintenance and diagnostic tools are documented in the security plan for the system.
  5. MNT-05_A05 strong authentication is employed in the establishment of nonlocal maintenance and diagnostic sessions.
  6. MNT-05_A06 records for nonlocal maintenance and diagnostic activities are maintained.
  7. MNT-05_A07 session connections are terminated when nonlocal maintenance is completed.
  8. MNT-05_A08 network connections are terminated when nonlocal maintenance is completed.
  9. MNT-05_A09 multifactor authentication is used to establish nonlocal maintenance sessions via external network connections.
  10. MNT-05_A10 nonlocal maintenance sessions established via external network connections are terminated when nonlocal maintenance is complete.

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.