3.7.6—Maintenance - Derived
>Control Description
>Discussion
This requirement applies to individuals who are performing hardware or software maintenance on organizational systems, while 3.10.1 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems (e.g., custodial staff, physical plant maintenance personnel). Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, consultants, and systems integrators, may require privileged access to organizational systems, for example, when required to conduct maintenance activities with little or no notice. Organizations may choose to issue temporary credentials to these individuals based on organizational risk assessments.
Temporary credentials may be for one-time use or for very limited time periods.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies govern supervision of maintenance personnel?
- •What procedures require escort or monitoring of maintenance staff?
- •Who provides supervision during maintenance activities?
- •How do you handle external vendor maintenance personnel?
- •What governance ensures maintenance personnel are properly supervised?
Technical Implementation:
- •How do you technically monitor maintenance personnel activities?
- •What logging captures maintenance personnel actions?
- •What access controls limit unsupervised maintenance access?
- •How do you implement just-in-time access for maintenance?
- •What video or session recording monitors maintenance work?
Evidence & Documentation:
- •Can you provide documentation of supervised maintenance sessions?
- •What logs show maintenance personnel activities and supervision?
- •Can you demonstrate escort procedures for external maintenance staff?
- •What evidence proves maintenance personnel are supervised?
- •What audit records verify supervision compliance?
Ask AI
Configure your API key to use AI features.