Under active development Content is continuously updated and improved

MA-5(1)Maintenance Personnel | Individuals Without Appropriate Access

IL4 Mod
IL4 High
IL5
IL6

>Control Description

(a) Implement procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements: (1) Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified; and (2) Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and (b) Develop and implement organization-defined alternate controls in the event a system component cannot be sanitized, removed, or disconnected from the system.

>DoD Impact Level Requirements

DoD FedRAMP+ Parameters

DSPAV must be used.

>Discussion

Procedures for individuals who lack appropriate security clearances or who are not U.S. citizens are intended to deny visual and electronic access to classified or controlled unclassified information contained on organizational systems. Procedures for the use of maintenance personnel can be documented in security plans for the systems.

>Related Controls

>Assessment Interview Topics

Questions assessors commonly ask

Process & Governance:

  • What formal policies and procedures govern the implementation of MA-5(1) (Individuals Without Appropriate Access)?
  • Who are the designated roles responsible for implementing, maintaining, and monitoring MA-5(1)?
  • How frequently is the MA-5(1) policy reviewed and updated, and what triggers policy changes?
  • What governance structure ensures MA-5(1) requirements are consistently applied across all systems?

Technical Implementation:

  • Describe the specific technical mechanisms or controls used to enforce MA-5(1) requirements.
  • What automated tools, systems, or technologies are deployed to implement MA-5(1)?
  • How is MA-5(1) integrated into your system architecture and overall security posture?
  • What configuration settings, parameters, or technical specifications enforce MA-5(1) requirements?

Evidence & Documentation:

  • What documentation demonstrates the complete implementation of MA-5(1)?
  • What audit logs, records, reports, or monitoring data validate MA-5(1) compliance?
  • Can you provide evidence of periodic reviews, assessments, or testing of MA-5(1) effectiveness?
  • What artifacts would you present during a FedRAMP assessment to demonstrate MA-5(1) compliance?

Ask AI

Configure your API key to use AI features.