🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Audit and Verify Physical Access Records for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.IX: A Compliance Checklist

A practical, step-by-step checklist for auditing and verifying physical access records to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.IX requirements.

•
April 16, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical Compliance Framework-focused checklist and step-by-step guidance to audit and verify physical access records for FAR 52.204-21 and CMMC 2.0 Level 1 control PE.L1-B.1.IX so small businesses can produce defensible evidence of who entered controlled spaces, when, and under what authorization.

Why auditing physical access records matters

Physical access records are evidence that your organization implemented and operated physical safeguards required by the Compliance Framework and contractual rules (e.g., FAR 52.204-21). If access records are missing, inaccurate, or not routinely validated you risk unauthorized access to Controlled Unclassified Information (CUI) or covered contractor information systems, contract non‑compliance, lost contracts, and reputational damage. A focused audit demonstrates due diligence and reduces the likelihood of security incidents and investigative findings.

Audit scope and required records

Define the scope before you start: list the physical locations (server rooms, records storage, developer areas), types of access controls (badge readers, biometric readers, mechanical keys, visitor logs), and time period to audit. For each location, collect the following records: electronic badge logs (controller exports), door controller event logs, CCTV recordings (time-synced), manual sign-in/out logs, temporary badge issuance records, maintenance/access exception tickets, and escort logs. The Compliance Framework expects auditors to be able to reconcile events across those sources to prove a consistent access history.

Technical implementation details auditors should verify

When you pull logs, verify technical attributes that prove reliability: timestamps in ISO 8601 with timezone, time synchronization source (NTP server) and last sync timestamp, unique credential IDs, door/controller IDs, event type (grant/deny/forced-entry/held-open), direction (in/out), and controller firmware version. Ensure logs include a source identifier for correlation (e.g., controller serial number). Recommended retention is based on contract terms; when unspecified, maintain at least 90 days of electronic access logs and 90 days of video while longer retention (180–365 days) is preferable for CUI environments. Logs should be stored in encrypted, tamper-evident storage and protected with role-based access to prevent modification.

Sample log schema and verification snippet

Ask for a CSV export or query results and verify column presence. A minimal CSV header useful for audits: timestamp, timezone, user_id, credential_id, door_id, reader_id, event_type, direction, access_result, controller_id, event_id. Example single-line export (ISO 8601):

2026-04-01T08:15:23Z,UTC,jdoe,CRD-10234,ServerRoom-1,ReaderA,ACCESS_GRANTED,IN,SUCCESS,CTR-01,EVT-55721

Step-by-step audit process and sampling methodology

1) Ingest and normalize logs into a spreadsheet or SIEM for the audit window. 2) Validate time sync—compare controller time vs. corporate NTP and CCTV timestamps. 3) Perform identity reconciliation: match credential ids to HR/payroll records to ensure badges belong to active employees. 4) Correlate badge events with video for a statistically significant sample (e.g., 10% of entries, minimum 20 events) across different days and shifts. 5) Review denied/forced-entry events and follow up on incident records. 6) Spot-check visitor logs by matching temporary badge issuance to reception sign-in sheets and CCTV. Maintain written findings for each discrepancy and note remediation actions and dates.

Preserving evidence and chain-of-custody

Capture exports in immutable formats (PDF with signed hash, or compressed CSV with SHA-256 checksum noted). Record who exported the data, export time, and why. When requesting CCTV clips, save the original clip and a working copy; produce hash values for each. If you anticipate a dispute, use a chain-of-custody form that documents transfer, storage location, and personnel access. For small businesses, cloud-based access control vendors often provide export metadata and audit trail features—record the vendor API call logs or UI screenshots to corroborate exports.

Real-world small business examples and tools

Example A: A 25-employee engineering shop uses a door controller with badge logs and basic CCTV. The compliance owner ran monthly reconciliations: exported last 90 days of badge events, compared badge holders to payroll, and sampled 30 badge events against video. Discrepancies (old contractor badges not deactivated) were closed within 48 hours. Example B: A 12-person consultancy uses a receptionist sign-in book and key cabinet. Auditors required a migration plan to an electronic visitor system (temporary QR badges) and implemented a 90-day retention policy for sign-in CSVs. Useful tools: Openpath/Kisi/Open-Azure AD for badge management, a small SIEM (Elastic, Splunk Free) for log normalization, and free utilities (sha256sum, ExifTool) for verifying media integrity.

Compliance tips and best practices

Keep these practical tips in mind: enforce a documented retention schedule that aligns with contracts; ensure NTP is configured and logged on all controllers; disable default admin accounts on controllers and rotate keys; implement role-based access for log exports; produce an audit workbook with samples, queries used, and remediation evidence; and schedule periodic (quarterly) physical access audits. Train your receptionist and facilities staff on temporary badge issuance and revocation procedures—most findings start with ad-hoc processes that became noncompliant over time.

In summary, auditing and verifying physical access records for FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.IX is a practical exercise in collecting the right records, validating their integrity, correlating across systems, and maintaining defensible evidence. Small businesses can meet these requirements by scoping carefully, applying simple technical controls (NTP, encrypted storage, hashes), sampling intelligently, and documenting remediation—this combination delivers both security and a clean compliance posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes