🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Audit and Remediate Public Content for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV: Checklist, Tools, and Compliance Steps

Step-by-step guide to discovering, auditing, and remediating public-facing content to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.IV using practical tools, checklists, and automation.

•
April 06, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Public-facing content that inadvertently exposes Controlled Unclassified Information (CUI), contractor-owned sensitive assets, or business-sensitive data is one of the most common and easiest compliance failures for small government contractors — this post gives a practical, step-by-step approach to audit and remediate public content to meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.IV) expectations.

Audit: Discover and inventory public assets

Start by creating a complete inventory of all internet-visible assets: corporate website(s), marketing microsites, developer subdomains, cloud object storage (S3, Azure Blob, Google Cloud Storage), public file shares, Git repositories, staging environments, and collaboration tools (Google Drive, OneDrive, SharePoint, Slack, Trello). For small businesses, cover the obvious places first: main domain and known subdomains, WordPress media directories, Google Drive folders labeled "Contracts" or "Bids", and any "Anyone with link" shares. Produce an asset spreadsheet (hostname, service, owner, last-scanned) and tag each entry for sensitivity review. This inventory is the baseline artifact auditors expect under the Compliance Framework and will guide prioritized remediation work.

Asset discovery and automated scanning

Use a mix of external reconnaissance and internal configuration queries. External tools: Amass or Subfinder for subdomains, SecurityTrails/Shodan/Censys for hosting and SSL info, and Google dorking (e.g., site:company.com filetype:pdf "proposal" OR "contract") to find indexed files. For web app analysis, run OWASP ZAP or Nikto to detect directory indexing and exposed endpoints. For cloud storage, run aws s3api get-bucket-acl and aws s3 ls s3://bucket-name to confirm ACLs and attempt read access; in Azure, use az storage container list and check publicAccess; in GCP, use gsutil ls -L gs://bucket-name. For repositories, run TruffleHog or Gitrob to identify secrets and accidentally committed files. Record scan outputs as evidence and pivot quickly to owners for remediation.

Manual review and evidence collection

Automated scans find many issues but manual review catches context-sensitive problems: open directory listings containing Excel spreadsheets with contract numbers, web forms that accept attachments with no size/type restrictions, or a marketing PDF that includes an attached signed Statement of Work. Manually inspect top hits from the discovery phase, validate whether files contain CUI or contract identifiers, and capture screenshots, URLs, timestamps, and the content hash of offending files. For each finding, map it back to the Compliance Framework requirement (FAR 52.204-21 basic safeguarding or CMMC AC.L1-B.1.IV) and include a short risk rationale in your evidence package (e.g., "Proposal_DRAFT.pdf contains bid pricing and was accessible without authentication to anyone with the URL").

Remediation: Remove exposure and apply controls

Remediation is threefold: remove sensitive content if it doesn't need to be public, apply authentication/authorization where it does, and harden configurations to prevent reoccurrence. Immediate tactical steps: take down or remove files from public buckets or web directories; change Google Drive/OneDrive/SharePoint sharing from "Anyone with link" to company-only; disable directory listing (e.g., in Apache set Options -Indexes); restrict access to staging sites via IP allowlists or HTTP basic auth; and rotate any credentials or secrets found in public repos. For content that must remain available externally (e.g., public marketing collateral), sanitize files to remove contract numbers, redacted images, or embedded metadata (use ExifTool to strip metadata) and ensure they don't contain embedded spreadsheets or hidden layers with sensitive data.

Cloud-specific hardening and automation

For cloud object stores, implement specific controls: set S3 bucket ACLs to private, apply bucket policies denying s3:GetObject to anonymous principals, enable Block Public Access (AWS), set Azure container access to private, and apply Uniform bucket-level access in GCP. Example commands: aws s3api put-public-access-block --bucket my-bucket --public-access-block-configuration BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true. Add automated guardrails: AWS Config rules (s3-bucket-public-read-prohibited), Azure Policy to prevent public blobs, GCP Organization Policies for storage. Integrate these checks into CI/CD pipelines (fail on a Terraform plan that would create a public-storage resource) and enable cloud logs (CloudTrail, Azure Activity Log) to detect changes. Small teams should consider enabling managed alerting (AWS Security Hub, Azure Defender) to receive prioritized findings instead of chasing email alerts.

Checklist, tools, and best practices for ongoing compliance

Checklist (compact): 1) Inventory public assets and owners; 2) Run automated discovery (Amass, Subfinder, Shodan); 3) Scan content and repos (TruffleHog, ZAP, Nikto); 4) Manually review top-risk artifacts and capture evidence; 5) Remove or restrict sensitive files; 6) Harden cloud storage ACLs and enable automated policies; 7) Configure WAF, HSTS, and X-Robots-Tag / robots meta tags where appropriate; 8) Document findings, remediation steps, and sign-off for auditors. Practical tools: Amass/Subfinder, Shodan/Censys, OWASP ZAP, TruffleHog/Gitrob, ExifTool, aws/az/gs CLI, and a simple spreadsheet or ticketing system for tracking remediation. Best practices include least-privilege IAM, MFA for all accounts, separation of production vs. staging with strict access controls, scheduled quarterly scans, and one-click removal processes for accidental exposures.

Failing to implement these controls increases the risk of CUI leakage, contract violations, reputational damage, regulatory penalties, and loss of future government work; even a small leak like an exposed pricing spreadsheet or draft SOW can trigger contract audits, incident response costs, and competitive harm. Documentation of your audit and remediation steps is as important as the technical fixes: auditors will want to see evidence of scanning, findings, owner assignment, remediation actions, and periodic revalidation under your Compliance Framework procedures.

Summary: For small businesses aiming to meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.IV), prioritize asset discovery, combine automated and manual reviews, apply immediate containment for exposed content, harden cloud and web configurations, and automate detection to prevent recurrence — keep clear records of every step so your Compliance Framework artifacts demonstrate both action and ongoing governance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes