{
  "title": "FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I Compliance Checklist: 10 Practical Steps to Limit Access to Authorized Users, Processes, and Systems",
  "date": "2026-04-15",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/far-52204-21-cmmc-20-level-1-control-acl1-b1i-compliance-checklist-10-practical-steps-to-limit-access-to-authorized-users-processes-and-systems.jpg",
  "content": {
    "full_html": "<p>Limiting access to authorized users, processes, and systems is a core requirement of FAR 52.204-21 and maps directly to CMMC 2.0 Level 1 control AC.L1-B.1.I; this post gives a concise, actionable 10-step checklist with implementation notes, small-business examples, and technical details you can apply right away to meet Compliance Framework expectations.</p>\n\n<h2>10 Practical Steps Checklist</h2>\n\n<h3>Steps 1–2: Define and document authorization boundaries and roles</h3>\n<p>1) Create an access control policy that documents which users, groups, processes, and systems are authorized to access Controlled Unclassified Information (CUI) or Covered Contractor Information Systems (CCIS). Map business roles to system roles (for example: \"Finance - payroll_app_admin\", \"Engineering - repo_readonly\"). 2) Implement Role-Based Access Control (RBAC) wherever possible — in Active Directory/Azure AD, AWS IAM, G Suite, or local application RBAC. Example: in Azure AD, create groups like \"CUI_Readers\" and \"CUI_Writers\" and assign group-based permissions to file shares and SaaS resources rather than assigning permissions to individuals.</p>\n\n<h3>Steps 3–4: Enforce least privilege and remove unnecessary privileges</h3>\n<p>3) Apply the principle of least privilege: ensure default accounts have no elevated rights and limit admin privileges to a small, documented set of people. Practically: maintain a dedicated \"BreakGlass\" account set stored in an encrypted password vault (e.g., Vault, LastPass Enterprise) for emergency use, monitored and logged. 4) Remove or disable unnecessary local accounts and services. On Windows, use Group Policy to disable local administrator accounts or rename them; on Linux, lock unused accounts (usermod -L username) and disable root SSH (set PermitRootLogin no in /etc/ssh/sshd_config).</p>\n\n<h3>Steps 5–6: Require multifactor authentication and strong authentication mechanisms</h3>\n<p>5) Enforce MFA for all interactive access to systems that host CUI or perform sensitive functions. Implement Conditional Access (Azure AD) or Conditional MFA policies in Okta to require MFA from unknown networks. 6) For machine-to-machine access, use short-lived credentials and strong identity federation: in AWS, prefer IAM roles with STS and temporary credentials (assume-role with session duration < 1 hour); in Kubernetes, use service accounts with RBAC and short-lived tokens. Avoid long-lived static keys stored in plaintext — rotate them regularly.</p>\n\n<h3>Steps 7–8: Control process and application access; use application whitelisting</h3>\n<p>7) Restrict which processes and applications can access sensitive data or run on endpoints. On Windows, enable AppLocker or Windows Defender Application Control (WDAC) to allow only approved executables; on Linux, use AppArmor or SELinux policies. 8) Isolate services using least-privilege containers or VMs — e.g., run build infrastructure in a separate subnet with network ACLs and IAM roles so CI/CD agents cannot access production secrets directly.</p>\n\n<h3>Steps 9–10: Network and device-level controls plus auditing</h3>\n<p>9) Segment the network and enforce device compliance: use VLANs, host-based firewalls, or Network Access Control (802.1X) to keep non-authorized devices off CUI networks; implement NAC that checks endpoint posture (patched OS, disk encryption) before granting access. 10) Enable and centralize logging (Windows Event Forwarding, syslog, AWS CloudTrail, Azure AD logs) and perform periodic access reviews: run quarterly account recertifications, report stale accounts, and keep audit trails for at least one year per FAR/CMMC guidance.</p>\n\n<h2>Real-world small-business scenarios</h2>\n<p>Scenario A: A 30-person subcontractor hosting design documents in Microsoft 365. Implementation: create AD groups for \"Design_Read\" and \"Design_Edit\", apply SharePoint folder permissions to groups, enforce Azure AD Conditional Access requiring MFA for external network access, enable Microsoft Defender Application Control, and configure Cloud App Security to block downloads from unmanaged devices. Scenario B: A cloud-native 12-person shop using AWS. Implementation: remove IAM users with long-lived keys, create IAM groups aligned to job functions, require MFA for the AWS console, use IAM roles for EC2 and Lambda with least privilege policies, and ship CloudTrail logs to a centralized S3 bucket with restricted access and automated alerts for console sign-ins from new locations.</p>\n\n<h2>Compliance tips and best practices</h2>\n<p>Maintain written procedures and a simple System Security Plan (SSP) that ties each of the 10 steps to the applicable FAR 52.204-21 paragraph and CMMC practice identifier (AC.L1‑B.1.I). Use automated tools for enforcement and evidence collection: run periodic access reviews with scripts that enumerate group membership (PowerShell Get-ADGroupMember, AzureAD Graph), schedule IAM credential reports (AWS IAM credential report), and store screenshots or logs in your compliance portal. Keep your control set pragmatic: for a small business, one well-documented Group Policy or Conditional Access policy is better than dozens of undocumented exceptions.</p>\n\n<h2>Risks of not implementing AC.L1-B.1.I</h2>\n<p>Failing to limit access increases the risk of insider misuse, lateral movement by attackers, and uncontrolled data exfiltration. Non-compliance can lead to contract disqualification, loss of federal business, and regulatory exposure. Technical consequences include compromised credentials enabling privilege escalation (e.g., unmonitored service accounts with long-lived keys), ransomware pivoting through permissive shares, and brittle incident response due to lack of audit trails.</p>\n\n<p>Summary: Implement the 10 steps above — define roles and boundaries, enforce least privilege and MFA, whitelist applications, segment networks, and centralize logging — and document them in policies and the SSP. For small businesses, focus on a handful of automated, enforceable controls (group-based permissions, MFA, short-lived credentials, and centralized logging) and schedule periodic access reviews to maintain compliance with FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I.</p>",
    "plain_text": "Limiting access to authorized users, processes, and systems is a core requirement of FAR 52.204-21 and maps directly to CMMC 2.0 Level 1 control AC.L1-B.1.I; this post gives a concise, actionable 10-step checklist with implementation notes, small-business examples, and technical details you can apply right away to meet Compliance Framework expectations.\n\n10 Practical Steps Checklist\n\nSteps 1–2: Define and document authorization boundaries and roles\n1) Create an access control policy that documents which users, groups, processes, and systems are authorized to access Controlled Unclassified Information (CUI) or Covered Contractor Information Systems (CCIS). Map business roles to system roles (for example: \"Finance - payroll_app_admin\", \"Engineering - repo_readonly\"). 2) Implement Role-Based Access Control (RBAC) wherever possible — in Active Directory/Azure AD, AWS IAM, G Suite, or local application RBAC. Example: in Azure AD, create groups like \"CUI_Readers\" and \"CUI_Writers\" and assign group-based permissions to file shares and SaaS resources rather than assigning permissions to individuals.\n\nSteps 3–4: Enforce least privilege and remove unnecessary privileges\n3) Apply the principle of least privilege: ensure default accounts have no elevated rights and limit admin privileges to a small, documented set of people. Practically: maintain a dedicated \"BreakGlass\" account set stored in an encrypted password vault (e.g., Vault, LastPass Enterprise) for emergency use, monitored and logged. 4) Remove or disable unnecessary local accounts and services. On Windows, use Group Policy to disable local administrator accounts or rename them; on Linux, lock unused accounts (usermod -L username) and disable root SSH (set PermitRootLogin no in /etc/ssh/sshd_config).\n\nSteps 5–6: Require multifactor authentication and strong authentication mechanisms\n5) Enforce MFA for all interactive access to systems that host CUI or perform sensitive functions. Implement Conditional Access (Azure AD) or Conditional MFA policies in Okta to require MFA from unknown networks. 6) For machine-to-machine access, use short-lived credentials and strong identity federation: in AWS, prefer IAM roles with STS and temporary credentials (assume-role with session duration \n\nSteps 7–8: Control process and application access; use application whitelisting\n7) Restrict which processes and applications can access sensitive data or run on endpoints. On Windows, enable AppLocker or Windows Defender Application Control (WDAC) to allow only approved executables; on Linux, use AppArmor or SELinux policies. 8) Isolate services using least-privilege containers or VMs — e.g., run build infrastructure in a separate subnet with network ACLs and IAM roles so CI/CD agents cannot access production secrets directly.\n\nSteps 9–10: Network and device-level controls plus auditing\n9) Segment the network and enforce device compliance: use VLANs, host-based firewalls, or Network Access Control (802.1X) to keep non-authorized devices off CUI networks; implement NAC that checks endpoint posture (patched OS, disk encryption) before granting access. 10) Enable and centralize logging (Windows Event Forwarding, syslog, AWS CloudTrail, Azure AD logs) and perform periodic access reviews: run quarterly account recertifications, report stale accounts, and keep audit trails for at least one year per FAR/CMMC guidance.\n\nReal-world small-business scenarios\nScenario A: A 30-person subcontractor hosting design documents in Microsoft 365. Implementation: create AD groups for \"Design_Read\" and \"Design_Edit\", apply SharePoint folder permissions to groups, enforce Azure AD Conditional Access requiring MFA for external network access, enable Microsoft Defender Application Control, and configure Cloud App Security to block downloads from unmanaged devices. Scenario B: A cloud-native 12-person shop using AWS. Implementation: remove IAM users with long-lived keys, create IAM groups aligned to job functions, require MFA for the AWS console, use IAM roles for EC2 and Lambda with least privilege policies, and ship CloudTrail logs to a centralized S3 bucket with restricted access and automated alerts for console sign-ins from new locations.\n\nCompliance tips and best practices\nMaintain written procedures and a simple System Security Plan (SSP) that ties each of the 10 steps to the applicable FAR 52.204-21 paragraph and CMMC practice identifier (AC.L1‑B.1.I). Use automated tools for enforcement and evidence collection: run periodic access reviews with scripts that enumerate group membership (PowerShell Get-ADGroupMember, AzureAD Graph), schedule IAM credential reports (AWS IAM credential report), and store screenshots or logs in your compliance portal. Keep your control set pragmatic: for a small business, one well-documented Group Policy or Conditional Access policy is better than dozens of undocumented exceptions.\n\nRisks of not implementing AC.L1-B.1.I\nFailing to limit access increases the risk of insider misuse, lateral movement by attackers, and uncontrolled data exfiltration. Non-compliance can lead to contract disqualification, loss of federal business, and regulatory exposure. Technical consequences include compromised credentials enabling privilege escalation (e.g., unmonitored service accounts with long-lived keys), ransomware pivoting through permissive shares, and brittle incident response due to lack of audit trails.\n\nSummary: Implement the 10 steps above — define roles and boundaries, enforce least privilege and MFA, whitelist applications, segment networks, and centralize logging — and document them in policies and the SSP. For small businesses, focus on a handful of automated, enforceable controls (group-based permissions, MFA, short-lived credentials, and centralized logging) and schedule periodic access reviews to maintain compliance with FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I."
  },
  "metadata": {
    "description": "A practical 10-step checklist to help small businesses meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I by restricting access to only authorized users, processes, and systems.",
    "permalink": "/far-52204-21-cmmc-20-level-1-control-acl1-b1i-compliance-checklist-10-practical-steps-to-limit-access-to-authorized-users-processes-and-systems.json",
    "categories": [],
    "tags": []
  }
}