Ensure equipment removed for off-site maintenance is sanitized of any CUI
📖 What This Means
This control means that any equipment (like laptops, servers, or hard drives) sent to an external vendor or location for repairs or maintenance must have all Controlled Unclassified Information (CUI) completely removed or securely erased beforehand. Think of it like shredding sensitive documents before throwing them away—but for digital data. For example, if a contractor sends a malfunctioning server to a third-party repair shop, they must ensure no CUI remains on the device. Another example: A laptop with CUI sent to the manufacturer for warranty repairs must be wiped clean or have its storage drive replaced before leaving your facility.
🎯 Why It Matters
Failure to sanitize equipment risks exposing CUI to unauthorized parties, leading to data breaches, contract penalties, or loss of DoD trust. In 2020, a defense contractor faced a $8.5M fine after a hard drive containing CUI was sold on eBay without proper sanitization. The DoD requires this control because off-site maintenance vendors often lack the same security clearances or controls as your organization. A single oversight could compromise national security or intellectual property. CMMC treats this as a Level 2 requirement because CUI must be protected throughout its lifecycle, even during maintenance.
✅ How to Implement
- 1. For cloud-managed devices (e.g., Azure AD-joined laptops), enforce BitLocker encryption and remotely wipe devices before off-site transfer using Microsoft Endpoint Manager.
- 2. Document the sanitization process in your cloud maintenance policy, including roles responsible for approval and verification.
- 3. Use AWS Storage Gateway or similar tools to ensure no CUI persists on physical appliances returned to cloud providers.
- 4. Maintain logs of sanitization actions in your SIEM (e.g., Splunk or Azure Sentinel).
- 5. Require vendors to sign a CUI sanitization acknowledgment form for cloud-related hardware.
📋 Evidence Examples
Equipment Sanitization Log
Vendor Acknowledgment Form
Sanitization Procedure Document
Training Records
Destruction Certificates
📝 SSP Guidance
Use this guidance when writing the System Security Plan (SSP) narrative for this control.
How to Write the SSP Narrative
For MA.L2-3.7.3 ("Ensure equipment removed for off-site maintenance is sanitized of any CUI"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe how system maintenance is controlled, including scheduling, change management, tool approval, remote maintenance security, and personnel authorization. Be specific -- name your actual products, settings, and responsible personnel.
Example SSP Narratives
"MA.L2-3.7.3 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to ensure equipment removed for off-site maintenance is sanitized of any cui. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."
"MA.L2-3.7.3 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to ensure equipment removed for off-site maintenance is sanitized of any cui. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."
"MA.L2-3.7.3 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."
System Boundary Considerations
- • Identify systems within the CUI boundary requiring maintenance
- • Document maintenance windows and change control process
- • Specify remote maintenance tools and access controls
- • Ensure this control covers all systems within your defined CUI boundary where ensure equipment removed for off-site maintenance is sanitized of any cui applies
- • Document any systems where this control is not applicable and explain why
Key Documentation to Reference in SSP
- 📄 Maintenance Policy
- 📄 Change management records
- 📄 Approved maintenance tool inventory
- 📄 Remote maintenance session logs
- 📄 Evidence artifacts specific to MA.L2-3.7.3
- 📄 POA&M entry if control is not fully implemented
What the Assessor Looks For
The assessor will review maintenance records for proper approval workflow, verify remote maintenance uses MFA and is logged, and check that non-company maintenance personnel are supervised.
💬 Self-Assessment Questions
Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.
Question 1: Do you maintain an inventory of all equipment containing CUI?
Question 2: Is there a documented procedure for sanitizing equipment before off-site maintenance?
Question 3: Are staff trained on sanitization procedures at least annually?
Question 4: Do you maintain logs of sanitization actions for each device?
Question 5: Do you obtain signed vendor acknowledgments for equipment without CUI?
⚠️ Common Mistakes (What Auditors Flag)
1. Assuming encryption equals sanitization
2. No verification step
3. Missing logs for 'minor' maintenance
4. Outdated vendor agreements
5. No contingency for failed sanitization
📚 Parent Policy
This practice is governed by the Maintenance Policy