By Melissa McCoy, Chief Information & Security Officer – CISSP-ISSAP, CCSP, RP
Don’t let routine fixes become security risks–track, control, and protect
Let’s take a moment to dive into a vital yet often overlooked aspect of cybersecurity: the maintenance controls outlined in NIST SP 800‑171. In this post, we go under the hood with Under the Hood: Securing System Maintenance with NIST SP 800‑171 to explore how these requirements ensure that any work performed on your systems, whether it’s routine software updates or critical hardware repairs, doesn’t inadvertently expose you to security threats. Just as you would entrust a skilled mechanic to care for your car, it’s important to monitor who is working on your systems, when, and how.
The cornerstone of these requirements is change control. You need to diligently track any administrative changes made to your controlled unclassified information (CUI) and the protective measures surrounding it within your IT infrastructure. Even small updates can affect how sensitive information is stored, accessed, or protected, so having clear visibility into each change is key.
Managing Remote Maintenance Securely
Another important consideration in today’s fast‑paced digital world is remote maintenance. While the convenience of online support is undeniable, it’s crucial to handle this with care. Any remote work should be authorized, secure, and thoroughly monitored. Access should not occur outside approved windows or without proper oversight. This prevents unintended or unnoticed activity, helping maintain a strong defensive posture even when work is performed off‑site.
Remote sessions must be controlled from start to finish, and organizations should verify that only the required systems are accessed. These precautions strengthen accountability and reduce the risk of unauthorized intrusions.
Building Resilience Through Proactive Controls
Though following these controls may initially seem cumbersome, they play a vital role in keeping your systems secure and efficient. By taking these proactive steps outlined in Under the Hood: Securing System Maintenance with NIST SP 800‑171, you can significantly reduce the risk of cyber threats and ensure your organization remains safe and resilient in the face of challenges. Thoughtful maintenance practices protect your environment, safeguard CUI, and help prevent small oversights from becoming major security issues.
Melissa McCoy of Kaizen Approach, Inc. shares biweekly insights to help your organization take a smarter, more confident path toward CMMC compliance. Like and share the CISO Perspectives blog, help us continue to improve the IC’s security posture.