MA · Plan wizard

Maintenance Plan

Documents how the system's maintenance activities are governed across scheduling, tool control, nonlocal (remote) maintenance, maintenance personnel, and timely component replacement. Covers the controls of the MA family in NIST SP 800-53 r5 and aligns with NIST SP 800-88 r1 (Sanitization), NIST SP 800-46 r2 (Remote Access), CNSSP-300 (Hardware Maintenance for National Security Systems), and FAR / DFARS clauses governing vendor maintenance personnel.

1
Full official name of the information system.
Short identifier used in headings and references.
Role or named individual accountable for the system.
Describe what falls inside the authorization boundary - components, services, networks, data flows.
2
Determines which controls in this family appear in your plan.
3
Approach basics → §4.x

Tooling and roles that anchor the rest of the plan.

Where maintenance is scheduled and recorded (e.g., 'ServiceNow CMDB + Change module', 'Maximo CMMS', 'Inherited from cloud provider — no system-managed hardware').
Role accountable for vendor maintenance personnel (e.g., 'Facilities Operations Manager + Contracting Officer', 'ISSO with PSO support').
How remote maintenance reaches system components (e.g., 'GFE-laptop + agency VPN with MFA + session recording', 'Vendor-side privileged-access workstation through bastion'). Reference the SC plan for transmission protections.
Where spare components are inventoried (e.g., 'Onsite cage + cloud-provider auto-replacement; CMDB tracks individual spares by serial').
One-line summary of which MA controls are inherited from the hosting provider (e.g., 'MA-2 / MA-3 inherited from AWS; system-managed for endpoint workstations only').
Controlled Maintenance (MA-2) → §4.x

Scheduling, approval, recording, and post-maintenance security.

How maintenance is approved before execution (e.g., 'CCB approves planned maintenance windows; emergency maintenance requires retroactive approval within 24h'). Reference CM-3 for change-control overlap.
How information is sanitized from a component before vendor maintenance (especially when component leaves the facility). Reference NIST SP 800-88 r1 categories (Clear / Purge / Destroy).
Verification that security controls remain intact after maintenance (FIM check, configuration-baseline verification, integrity scan). Reference SI-7 for integrity verification.
How long maintenance records are retained. Reference NARA records-retention schedule.
Maintenance Tools (MA-3) → §4.x

Tool inventory, inspection, and media handling.

How maintenance tools are inspected for improper modifications before use. Tamper-evident packaging, vendor-supplied integrity hashes.
How media brought in for diagnostics (USB, CDs, etc.) is scanned for malware before use. Dedicated scan-station, write-blocked-read.
How equipment is checked at removal (per MA-3(3)) — verify the component or media is sanitized or authorized for removal. Coordinated with PE-16.
Where maintenance tools are stored when not in use (locked cabinet, controlled checkout system).
Nonlocal Maintenance (MA-4) → §4.x

Remote / vendor maintenance over network channels.

How a nonlocal maintenance session is initiated (e.g., 'Vendor requests via Service Now → ISSO approval → just-in-time bastion access opened for the window → revoked at session end').
How session termination is verified (no lingering processes, no re-auth credentials cached).
How long nonlocal-maintenance session recordings are retained. Useful for after-action review when anomalies are reported. Reference AU plan.
If applicable: special handling per CNSSP-300. Often non-local maintenance is prohibited on classified systems.
Maintenance Personnel (MA-5) → §4.x

Vendor staff governance, escort, and access.

Required background-investigation level for maintenance personnel. Reference PS-3 / PS-7 standards. Cleared vs uncleared personnel handling.
How specific vendor employees are authorized for access (vendor-supplied roster, PIV-I cards, agency-issued temporary badges). Reference PS-7.
Time from vendor-personnel-change notification to access record updated. Common: 'Within 1 business day'.
How vendor visits are reviewed after the fact (escort log review, surveillance review for anomalies, badge-event reconciliation).
Timely Maintenance (MA-6) → §4.x

Spare-parts inventory and component-replacement SLAs.

Components for which timely-maintenance SLAs apply. MA-6 ODV — system components requiring obtainable spare parts within an organization-defined time period.
Time within which each component class must be replaceable. Example: 'HSM: 24h; production database server: 4h via cloud-provider auto-replacement; network appliance: 72h with vendor next-business-day support contract'.
How often spares are tested to ensure they are functional when needed (rotation schedule, periodic boot test).
Maintenance Scope and Coverage → §2.x

Quantitative scope numbers that anchor metrics later in the plan.

Approximate count of components that need MA-2 controlled-maintenance handling.
Approximate count of vendor maintenance personnel with system access (PS-7).
Approximate sessions per quarter (anchors session-recording storage planning).
Count of components covered by spare-parts inventory (MA-6).
Maintenance Metrics & KPIs → §6.x

Metrics tracked to demonstrate MA control effectiveness.

    Suggested:
    Maintenance Anomaly Detection → §6.x

    How anomalies in maintenance activity are detected and escalated.

    How detected anomalies escalate (typically to the IR plan workflow). Severity classification.
    Cross-references to other RMF artifacts → §7

    Where this plan plugs into the broader RMF package.

    Where in the SSP the MA control implementations are summarized (e.g., 'SSP §13.7').
    Convention for MA-related POA&M items (e.g., 'POAM-MA-' for general).
    How MA-5 maintenance personnel use the PE-3 escort policy and PE-2 access list. Vendor-visit coordination.
    How MA-5 maintenance personnel are screened per PS-3 / PS-7. Trigger when vendor personnel change.
    How MA-3(2) media inspection coordinates with MP-5 transport handling and MA-2 pre-maintenance sanitization with MP-6 sanitization.
    How MA-2 maintenance records feed CM-3 change control where maintenance produces configuration changes.
    How maintenance anomalies (tampered tools, unauthorized media, anomalous nonlocal sessions) escalate into the IR plan.
    Pointer to the CA-7 monitoring strategy document tying MA continuous-monitoring metrics to the broader ConMon plan.
    4

    Pick a baseline in section 2 and the applicable controls will appear here. Each control gets a card with the official text, related controls, linked CCIs, and fields for your implementation status, narrative, responsible role, and evidence.

    5