NIST indicates that maintenance supervision applies to individuals performing hardware or software maintenance on organizational information systems. Technical competence of supervising individuals relates to the maintenance performed on the information systems while having required access authorizations refers to maintenance on and near the systems. Individuals not previously identified as authorized maintenance personnel, such as information technology manufacturers, vendors, systems integrators, and consultants, may require privileged access to organizational information systems, for example, when required to conduct maintenance activities with little or no notice. The organization establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel. Ensure that non-escorted personnel performing maintenance on the information system have required access authorizations and designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations. (Source)
This Blog provides tips on how to secure remote access. There are links within the document to additional articles. This link provides 5 best practices for controlling third-party vendor risks. This link provide a sample policy from the Colorado Department of Education. It creates a formal process of maintaining hardware and software to ensure that a clearly defined set of procedures is used to manage system resources. From the Department of Homeland Security, these are recommended practices for configuring and managing remote access for control systems covering various roles including vendors, field technicians, business partners (all of which may have differing requirements.) The organization: a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel; b. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations. This is State of North Carolina’s IT System Maintenance policy and provides an example of the roles, responsibilities and various components of maintenance supervision. This link serves as an example of a company policy for managing third-party vendor remote access. This link provides a basic outline of considerations and tips when selecting a third-party vendor.
This document provides assessment guidance for Level 1 of the Cybersecurity Maturity This document provides assessment guidance for conducting Cybersecurity Maturity Model This Handbook provides a step-by-step guide to assessing a small manufacturer’s information systems against the security requirements in NIST SP 800-171 rev 1. The purpose of this publication is to provide procedures for assessing the CUI requirements in NIST Special Publication 800-171.
Model Certification (CMMC).
Certification (CMMC) assessments for Level 3 and Level 2.