STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← MA-3 (4) — Maintenance Tools

CCI-002883

Definition

Restrict the use of maintenance tools to authorized personnel only.

Parent Control

MA-3 (4)Maintenance ToolsMaintenance

Linked STIG Checks (9)

V-255654CAT ICounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.ForeScout CounterACT NDM Security Technical Implementation GuideV-234197CAT IIFortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.Fortinet FortiGate Firewall NDM Security Technical Implementation GuideV-24348CAT IIDial-out access from the Hardware Management Console Remote Support Facility (RSF) must be restricted to an authorized vendor site.IBM Hardware Management Console (HMC) STIGV-256869CAT IIDial-out access from the Hardware Management Console Remote Support Facility (RSF) must be restricted to an authorized vendor site.IBM Hardware Management Console (HMC) Security Technical Implementation GuideV-258600CAT IThe ICS must be configured to prevent nonprivileged users from executing privileged functions.Ivanti Connect Secure NDM Security Technical Implementation GuideV-202116CAT IINetwork devices performing maintenance functions must restrict use of these functions to authorized personnel only.Network Device Management Security Requirements GuideV-279251CAT IThe Edge SWG must be configured to use at least two authentication servers for the purpose of authenticating users prior to granting administrative access.Symantec Edge SWG NDM Security Technical Implementation GuideV-242254CAT IThe TippingPoint SMS must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access and to enforce access restrictions.Trend Micro TippingPoint NDM Security Technical Implementation GuideV-265292CAT IThe NSX Manager must assign users/accounts to organization-defined roles configured with approved authorizations.VMware NSX 4.x Manager NDM Security Technical Implementation Guide