Skip to content

3.7.5 — MFA for Remote Maintenance

Require multifactor authentication to establish nonlocal maintenance sessions via external network connections and terminate such connections when nonlocal maintenance is complete.

Two requirements:

  1. MFA required. Any remote maintenance session on CUI systems must use multifactor authentication — something you know (password) plus something you have (authenticator app, hardware token) or something you are (biometric). This applies to internal staff connecting remotely and to vendor remote support.

  2. Sessions terminated when done. No persistent remote maintenance connections. When the work is complete, the session is disconnected. No “always-on” remote access tools left running. VPN sessions are closed, remote desktop sessions are terminated, vendor access is revoked.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Is MFA used for remote maintenance sessions?MFA configured on all remote access paths used for maintenance — VPN, RDP, vendor tools
2Are sessions terminated when maintenance is complete?Session logs showing start and end times; no persistent maintenance connections

Documents they’ll review: Maintenance policy; procedures for remote maintenance; system configuration showing MFA on remote access; session logs; system security plan

People they’ll talk to: Maintenance personnel; information security personnel; system or network administrators

Live demos they’ll ask for: “Show me MFA on your remote maintenance access.” “Show me a session log — does it show start and end times?” “How do you terminate vendor remote access when work is done?”


  • “Is MFA required for remote maintenance? Show me the configuration.”
  • “How do you ensure sessions are terminated when work is done?”
  • “How do you handle vendor remote access — TeamViewer, AnyDesk, VPN?”
  • “Are remote maintenance sessions logged with start and end times?”

No MFA on remote tools. Vendor uses TeamViewer with just a password. All remote maintenance access must require MFA.

Persistent connections. VPN stays connected 24/7 or a remote access tool is always running. Terminate sessions when work is done.

Vendor controls access. The vendor decides when to connect — not you. You must control vendor remote access: time-limited credentials, MFA, and monitored sessions.



RequirementWhy it matters here
3.5.3 — MFA for AllMFA requirement applied specifically to remote maintenance
3.7.6 — Escort Uncleared TechsVendor personnel supervision applies to remote sessions too
3.1.12 — Monitor Remote SessionsRemote maintenance sessions must be monitored and controlled

🔒

Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.

Start a conversation →

CMMC Practice ID: MA.L2-3.7.5 | SPRS Weight: 5 points | POA&M Eligible: No