Maintenance tools are a vector. A compromised diagnostic tool or vendor device can introduce malware during routine maintenance. You need to know what tools touch your systems and verify they’re legitimate.
What the assessor is actually evaluating
The assessor is checking: (1) Do you know what tools are used for maintenance? (2) Do you verify they’re legitimate and not compromised? (3) Do you control access to them? This isn’t about having a sophisticated tool management system. It’s about being deliberate. You have a list. You verify. You control. This practice ties directly to MA.L2-3.7.1 (system maintenance scheduling) and works with MA.L2-3.7.4 (media inspection) to keep maintenance tooling secure.
For many small organizations, this is simple: vendor tools come with serial numbers you verify, internal tools are stored securely, and only authorized personnel use them.
What a realistic SSP definition looks like
All maintenance tools are maintained on an approved tools list. Tools are verified by model/serial number before use. Tools are obtained only from authorized vendors and scanned for malware before use on CUI systems. Tools are stored in a secure location with access limited to authorized maintenance staff.
Approved tools include: [vendor diagnostic tool, internal imaging tool, etc.]. Verification is documented in [maintenance log/tracking system].
How to present your evidence
- Approved maintenance tools list (model, serial number, vendor, purpose)
- Vendor documentation or receipts showing tool legitimacy
- Maintenance or maintenance log showing tools used and verification done
- Documentation of tool storage and access control
- If applicable, records of malware scans on tools before use
Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.
Q: “How do you verify them?" A: “We check serial numbers against vendor records and scan them for malware before they touch CUI systems.”
Q: “Where are they stored?" A: “In a locked cabinet in [location]. Only [role] has access.”
Common failures
Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.
Practical implementation
If you have an MSP, they bring tools. Get them to provide a list of what they use on your systems. Add it to your approved tools list. Require them to scan those tools before use.
For internal tools (imaging software, network diagnostics), store them on a secured drive or server. Control who can copy or use them.
For one-off vendor tools, verify the serial number matches the vendor documentation before letting it touch your network.
If you use an MSP/MSSP
This guide reflects CMMC Level 2 requirements as of March 2026. CMMC and NIST standards evolve. Verify current requirements with official CMMC materials and your assessor.