Physical access controls are a core requirement under FAR 52.204-21 and map to CMMC 2.0 Level 1 practice PE.L1-B.1.VIII; this post gives you a practical audit approach and an evidence checklist tailored to small businesses seeking to demonstrate they prevent unauthorized physical access to Federal Contract Information (FCI) and covered defense data.
Understanding the requirement and key objectives
The Compliance Framework Practice PE.L1-B.1.VIII requires controls that ensure only authorized personnel can physically access areas where FCI or other covered information is stored, processed, or transmitted. Key objectives are: (1) prevent unauthorized entry to workspaces and server/telecom closets, (2) control visitor and contractor access, (3) maintain tamper-evident protection of devices and media, and (4) retain verifiable evidence of access events. For small businesses this often means a mixture of administrative policy, low-cost technical controls, and documented processes that together provide reasonable assurance against unauthorized access.
Audit preparation: scope, stakeholders, and evidence to plan for
Begin the audit by defining the physical scope (offices, server rooms, storage closets, shared facilities), listing stakeholders (facility manager, IT admin, HR, security contractor), and compiling existing artifacts: physical security policy, visitor policy, badge issuance records, access control system exports, CCTV retention policy, asset inventory, contractor access agreements, and training logs. For Compliance Framework reporting, document who was interviewed, dates of walkthroughs, and the specific locations inspected.
Checklist — What to audit and how to document each control
Use this checklist to inspect and collect evidence. For each item capture the policy or procedure, in-place technical control, sample logs/photos, and a small narrative of the test performed (who attempted access, when, and result):
- Perimeter and entry points: Verify locks on external doors, strike/maglock wiring, and that emergency exit hardware is compliant; collect photos and a maintenance ticket showing last service.
- Controlled areas (server/telecom closets): Verify dedicated locks, badge/PIN access, two-factor door access (recommended), sensor/alarm presence, and export last 90 days of badge logs showing all entries and exits.
- Visitor control and escorting: Confirm signed visitor logbooks or electronic sign-in, visitor badges, escorting policy, and two sampled visitor records linking to staff sponsor signoff.
- Badge and key management: Audit onboarding/offboarding records, badge issuance and return receipts, and a deprovisioning timeline (target: revoke physical/ logical access within 24 hours of termination); collect a sample of revoked badge IDs and timestamps from the access control system.
- Video surveillance and retention: Verify camera placement covers entrances and sensitive rooms, retention policy (90 days recommended for small orgs handling FCI), and export a time-stamped clip from a specific access event for proof.
- Asset protection and media storage: Ensure lockable cabinets/safes for spare laptops and printed FCI, asset tags on devices, and an inventory with last audit date; produce a photo and the inventory entry for a sample device.
- Contractor and third-party access: Collect signed NDAs, time-limited access approvals, and one example of a contractor’s escorted entry record; verify background check requirements if applicable.
- Environmental and tamper detection: Check for environmental sensors (temperature, humidity, water leak) and tamper switches for racks; attach sensor alert logs for the last 6 months if available.
- Periodic reviews and audits: Produce the most recent access review report (who had access vs. who should have access), and corrective action records.
Technical specifics and practical implementation details
Small businesses can implement compliant controls without enterprise budgets. Use cloud-managed access systems (e.g., Openpath, Kisi) that provide badge/PIN logs exportable as CSV with fields: timestamp, user_id, point_of_entry, event_type (grant/deny), and door_state. For cameras, pick models that can produce tamper-evident, time-synced video files; set retention to 60–120 days depending on risk tolerance. For server closets, use an electric strike or maglock with battery backup and integrate with the access controller so that events are logged; consider two-factor door authentication (badge + PIN or badge + mobile app) for rooms containing critical systems. Ensure firmware on access controllers and cameras is patched and that default credentials are changed—document patch dates and change control records.
Real-world small business scenarios
Scenario A — 20-person software shop: The team stores development servers in a locked closet. Implementation steps: install an RFID reader with cloud logging, require badge access during business hours, keep spare devices in a steel cabinet with a keyed lock, and maintain a visitor log for guests. Audit evidence: badge log exports showing only authorized employee entries, photos of locked cabinet, and the visitor log signed by sponsor. Scenario B — Small manufacturing subcontractor: FCI exists on printed drawings and on shop-floor PCs. Controls: lockable filing cabinet for drawings, workstation screensaver auto-lock (30s–5min), CCTV covering entry and workstation rows, and a contractor escort policy for third-party repair technicians; audit by sampling the cabinet inventory and CCTV clip for an escorted visit.
Risks of non-implementation and common audit failures
Failing to implement or document these controls exposes you to unauthorized access, data compromise, loss of government contracts, possible financial penalties, and reputational damage. Common audit failures include missing deprovisioning records, inadequate CCTV retention, unlocked server closets, lack of visitor escort evidence, and outdated firmware on access hardware—each of these creates a concrete path for exfiltration or tampering that auditors will flag under FAR 52.204-21 mapping.
Compliance tips and best practices
Practical tips: (1) automate badge deactivation via HR/identity system to meet the 24-hour deprovisioning goal, (2) keep at least 90 days of access logs and 60–90 days of video for small firms, (3) run quarterly access reviews and document signoffs, (4) use tamper-evident seals and serial-numbered asset tags for media, (5) test visitor escorting by conducting surprise walkthroughs, and (6) maintain a simple evidence binder or secure folder with labeled artifacts (policies, logs, photos, export files) keyed to each checklist line item to simplify future audits.
In summary, auditing and documenting physical access for FAR 52.204-21 / CMMC 2.0 Level 1 PE.L1-B.1.VIII is achievable for small businesses by combining clear policies, low-cost technical controls, repeatable processes, and an evidence-first approach—use the checklist above to collect policy documents, technical logs, photos, and test narratives so you can demonstrate ongoing compliance and reduce the risk of unauthorized physical access.