Policy and Procedures
To meet the FedRAMP Moderate “Policy and Procedures” requirement for maintenance (MA-1), you must create, approve, publish, and keep current a maintenance policy and supporting procedures that clearly define purpose, scope, roles, responsibilities, management commitment, coordination points, and compliance expectations for the system boundary. Treat this as an operational contract: it must be actionable, used by teams, and provable in evidence. (NIST Special Publication 800-53 Revision 5)
Key takeaways:
- Your maintenance policy states the “what” and “why”; your procedures define the “how, by whom, and with what records.”
- Examiners look for governance (approval, ownership, review cadence) plus working execution proof (tickets, logs, schedules, exceptions).
- Scope must align to the FedRAMP system boundary, including third parties who perform or support maintenance.
MA-1 is a deceptively small control with outsized exam impact. In a FedRAMP assessment, maintenance is never just “patching.” It includes the guardrails around performing maintenance safely: who can do it, how it is requested and approved, what needs to be logged, how you coordinate with security and operations, and how you demonstrate compliance over time. The MA-1 requirement forces you to formalize those guardrails into two deliverables: a maintenance policy and maintenance procedures. (NIST Special Publication 800-53 Revision 5)
For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing MA-1 is to (1) set system-boundary scope, (2) assign accountable owners, (3) publish a policy that sets mandatory rules, (4) write procedures that map directly to how work happens in your ITSM and engineering workflows, and (5) collect evidence as a byproduct of the process. If the policy reads well but your teams cannot follow it without inventing steps, you will struggle in assessment. If your teams follow a process but you cannot tie it to documented requirements and approvals, you will also struggle. MA-1 is the bridge between those two failures. (NIST Special Publication 800-53 Revision 5)
Regulatory text
Requirement (excerpt): “Develop, document, and disseminate a maintenance policy and procedures that address purpose, scope, roles, responsibilities, management commitment, coordination, and compliance.” (NIST Special Publication 800-53 Revision 5)
What the operator must do: You must produce a written maintenance policy and written maintenance procedures, approve them through management, and distribute them to the people who perform or govern maintenance for the in-scope system. The documents must explicitly cover the listed elements (purpose, scope, roles, responsibilities, management commitment, coordination, compliance) and must be maintained so they remain accurate as the environment changes. (NIST Special Publication 800-53 Revision 5)
Plain-English interpretation
MA-1 asks: “Do you run maintenance in a controlled, repeatable way, and can you prove it?” Your policy is the top-level rulebook (mandatory statements). Your procedures are the runbooks (step-by-step workflows) that create consistent outcomes and consistent evidence.
Think of maintenance as any activity that changes, repairs, or services system components. The control does not require a specific tooling stack, but it does require that your tooling and workflow match what you documented and that staff can find and follow the documentation.
Who it applies to
Entity types: Cloud Service Providers and Federal Agencies operating systems within the FedRAMP Moderate baseline. (NIST Special Publication 800-53 Revision 5)
Operational context (what to scope):
- The FedRAMP system boundary (production and supporting components that are in-scope).
- Teams performing maintenance: SRE/operations, platform engineering, network, endpoint, database, and security operations.
- Third parties that perform maintenance or provide managed services affecting in-scope components (for example, a managed database provider inside your boundary, or a subcontractor with admin access). You do not need a separate MA-1 for each third party, but your procedures must explain how their work is governed and evidenced.
What you actually need to do (step-by-step)
1) Set and document scope to the system boundary
- List the in-scope components and maintenance-relevant services (compute, network, storage, hypervisors, managed services, CI/CD runners if in-scope).
- Define what counts as “maintenance” in your environment (patching, firmware updates, break-fix, preventative maintenance, approved configuration changes, hardware servicing where applicable).
- State what is out of scope and why (only if it is truly outside the FedRAMP boundary).
Output: “Scope” section in the policy plus a short procedure preface that ties maintenance workflows to the system inventory/CMDB.
2) Assign roles and responsibilities people can execute
Define, at minimum:
- Policy owner (accountable for updates and exceptions).
- Procedure owner(s) (often IT Operations, Platform Engineering).
- Approvers (change management, security, system owner).
- Implementers (engineers/ops staff).
- Reviewers (security/compliance who validate control operation).
Use role names that exist in your org chart and ITSM. If you write “Maintenance Manager” but nobody has that title or responsibility, exams stall.
Output: RACI table embedded in the procedure or appended to the policy.
3) Write the maintenance policy (the “shall” statements)
Your policy should be short and enforceable. Include these required elements explicitly: (NIST Special Publication 800-53 Revision 5)
- Purpose: Why controlled maintenance matters for the system (availability, integrity, security).
- Scope: Systems, environments, and maintenance activities covered.
- Roles/responsibilities: Governance, execution, and oversight responsibilities.
- Management commitment: A clear statement that leadership requires adherence, supports resourcing, and authorizes enforcement.
- Coordination: Required coordination with security, change management, incident response, and third-party contacts.
- Compliance: How compliance is verified (audits, reviews) and consequences/handling for deviations (exceptions process).
Policy drafting tip: write requirements that are testable. Example: “All maintenance affecting in-scope production components must be performed through the approved change process and recorded in the ticketing system.”
4) Write the maintenance procedures (the “how” in workflow form)
Procedures should map to real operational tooling (ITSM, Git, CI/CD, endpoint management). Cover:
- Maintenance request intake: who can request, required fields, prioritization.
- Risk assessment and approvals: when security approval is required; how you evaluate impact.
- Scheduling and coordination: maintenance windows, customer/agency notifications if applicable, coordination with incident response if emergent.
- Execution steps: pre-checks, backups/rollback points, implementation, validation.
- Logging and records: what you record, where, and retention responsibility (don’t invent durations; define “per program retention requirements” if you cannot set a fixed period).
- Exceptions and emergency maintenance: how you handle break-fix while preserving governance (documented rationale, after-the-fact review, evidence capture).
Operational trick: format each procedure as “Inputs → Steps → Outputs → Evidence.” That structure makes assessments easier and prevents gaps.
5) Disseminate and make it usable
“Disseminate” means staff can find it and are expected to follow it. (NIST Special Publication 800-53 Revision 5)
- Publish in your controlled document repository.
- Train or brief relevant teams (record attendance or acknowledgements).
- Link procedures from the place work starts (ITSM templates, change request forms, engineering handbook).
6) Prove it runs: attach evidence to normal operations
You want evidence created automatically:
- Maintenance tickets and change records.
- Approvals captured in workflow.
- Implementation logs, screenshots, pipeline logs, or system-generated audit logs.
- Post-maintenance validation notes and closure criteria.
- Exception records and corrective actions.
If you are using Daydream to manage third-party and control evidence, treat MA-1 evidence as a standing collection: define a MA-1 evidence request template (policy, procedures, sample change records, exception log) and keep it current so audits become export work, not archaeology.
Required evidence and artifacts to retain
Maintain a tight “MA-1 evidence packet”:
- Approved maintenance policy (versioned, with approver and approval date). (NIST Special Publication 800-53 Revision 5)
- Approved maintenance procedures (versioned, mapped to tools/workflows). (NIST Special Publication 800-53 Revision 5)
- Document distribution proof (publication location, access controls, announcement, training/attestation record).
- Role assignment proof (RACI, job responsibilities, system security plan references if you maintain them).
- Operational records: representative maintenance/change tickets, approvals, maintenance logs, validation evidence.
- Exceptions: documented exception requests, risk acceptance, expiration, and remediation plan.
Common exam/audit questions and hangups
Expect these lines of questioning:
- “Show me where purpose, scope, roles, management commitment, coordination, and compliance are addressed in the policy/procedures.” (NIST Special Publication 800-53 Revision 5)
- “Who owns the policy, and how do you keep it current?”
- “Demonstrate dissemination. How do engineers find the procedure at 2 a.m.?”
- “Give samples: one planned maintenance event and one emergency maintenance event. Show approvals and evidence.”
- “How do third parties performing maintenance follow your rules, and how do you collect their evidence?”
Hangup pattern: teams provide a policy PDF but cannot show executed tickets tied to it, or they provide tickets but the policy/procedure is generic and missing required MA-1 elements.
Frequent implementation mistakes and how to avoid them
-
Policy written as a textbook.
Fix: convert statements into testable “must/shall” requirements tied to workflows. -
Scope mismatch.
Fix: explicitly tie scope to the FedRAMP system boundary and inventory, and state where maintenance records live for each component class. -
No management commitment in writing.
Fix: include an executive-approved statement and demonstrate approval in the document control metadata. (NIST Special Publication 800-53 Revision 5) -
Procedures that don’t match reality.
Fix: write procedures from the ITSM forms and pipeline steps backward; include screenshots or field lists as appendices if helpful. -
Third parties treated as “someone else’s problem.”
Fix: require that third-party maintenance affecting in-scope components uses your ticketing/approval channel or produces equivalent records you ingest and retain.
Enforcement context and risk implications
No public enforcement cases were provided for this requirement. Practically, MA-1 failures show up as control weaknesses during assessments because maintenance touches availability and security: undocumented emergency changes, unclear approval authority, and missing records are hard for assessors to accept. The risk outcome is straightforward: you cannot reliably prove change control discipline, which can cascade into findings across configuration management, vulnerability management, and incident response dependencies.
Practical 30/60/90-day execution plan
First 30 days (stabilize and draft)
- Confirm system boundary scope for maintenance and list in-scope component categories.
- Identify owners and approvers; publish a draft RACI.
- Draft maintenance policy with explicit MA-1 elements. (NIST Special Publication 800-53 Revision 5)
- Inventory current maintenance workflows (ITSM, GitOps, endpoint tooling) and identify gaps against “evidence by default.”
By 60 days (implement and align operations)
- Finalize and obtain management approval for the policy and procedures; version-control them. (NIST Special Publication 800-53 Revision 5)
- Update ITSM templates (required fields, approval steps, linkage to maintenance procedure).
- Stand up an exceptions workflow for emergency maintenance with defined after-action review steps.
- Roll out dissemination: publish docs, brief teams, collect acknowledgements.
By 90 days (prove and harden)
- Run a tabletop evidence pull: select recent maintenance events and assemble the MA-1 evidence packet.
- Fix recurring evidence gaps (missing approvals, missing validation notes, poor ticket categorization).
- Add periodic control checks (spot checks by GRC, operational metrics you can explain without inventing numbers).
- If third parties perform maintenance, test evidence intake and ensure contractual/work-order language supports it.
Frequently Asked Questions
Do we need separate documents for “policy” and “procedures”?
You need policy content and procedure content that meet MA-1 and are disseminated. Many teams keep them as separate documents for clarity, but a single controlled document with distinct sections can work if it is explicit and usable. (NIST Special Publication 800-53 Revision 5)
What counts as “disseminate” for auditors?
Disseminate means the right personnel can access the policy/procedures and are expected to follow them. Keep proof of publication location, access permissions, and training or acknowledgement records. (NIST Special Publication 800-53 Revision 5)
How detailed should maintenance procedures be?
Detailed enough that a new operator can follow the workflow without inventing steps, and detailed enough that each step produces evidence. If your process depends on ITSM fields or pipeline logs, name them and show where they live.
How do we handle emergency maintenance without failing MA-1?
Define an emergency path that still requires a ticket, a documented rationale, and an after-action review with approvals captured after implementation. Your procedure should state who can declare an emergency and what minimum records are required.
Do third parties have to follow our exact maintenance process?
They must meet your maintenance governance requirements for in-scope components, including approvals, coordination, and evidence. If they use their own systems, require equivalent records and define how you ingest and retain them.
What evidence is strongest during a FedRAMP assessment?
A signed/approved policy and procedures plus multiple real maintenance records that show the documented workflow in action: approvals, implementation notes, validation results, and exception handling where applicable. (NIST Special Publication 800-53 Revision 5)
Frequently Asked Questions
Do we need separate documents for “policy” and “procedures”?
You need policy content and procedure content that meet MA-1 and are disseminated. Many teams keep them as separate documents for clarity, but a single controlled document with distinct sections can work if it is explicit and usable. (NIST Special Publication 800-53 Revision 5)
What counts as “disseminate” for auditors?
Disseminate means the right personnel can access the policy/procedures and are expected to follow them. Keep proof of publication location, access permissions, and training or acknowledgement records. (NIST Special Publication 800-53 Revision 5)
How detailed should maintenance procedures be?
Detailed enough that a new operator can follow the workflow without inventing steps, and detailed enough that each step produces evidence. If your process depends on ITSM fields or pipeline logs, name them and show where they live.
How do we handle emergency maintenance without failing MA-1?
Define an emergency path that still requires a ticket, a documented rationale, and an after-action review with approvals captured after implementation. Your procedure should state who can declare an emergency and what minimum records are required.
Do third parties have to follow our exact maintenance process?
They must meet your maintenance governance requirements for in-scope components, including approvals, coordination, and evidence. If they use their own systems, require equivalent records and define how you ingest and retain them.
What evidence is strongest during a FedRAMP assessment?
A signed/approved policy and procedures plus multiple real maintenance records that show the documented workflow in action: approvals, implementation notes, validation results, and exception handling where applicable. (NIST Special Publication 800-53 Revision 5)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream