🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a BYOD and Third-Party Device Policy Aligned with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Step-by-step guidance for small businesses to create a BYOD and third-party device policy that meets FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.III) requirements.

•
April 23, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Managing Bring Your Own Device (BYOD) and third-party devices is a common operational reality for small government contractors and businesses handling Federal Contract Information (FCI); to meet FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.III), you need a practical, documented policy that combines clear rules, technical controls, and an audit-ready compliance posture.

Why this policy matters and what AC.L1-B.1.III expects

FAR 52.204-21 requires basic safeguarding of covered contractor information systems; CMMC Level 1 mirrors that with specific practices to limit unauthorized system access and manage devices. AC.L1-B.1.III targets controlling devices used to access or process FCI — including employee-owned mobile phones, tablets, and devices operated by subcontractors or vendors — so that only authorized devices with appropriate protections can connect to corporate resources. The risk of not implementing this is tangible: data leakage, unauthorized access to FCI, contract noncompliance, termination, and reputational damage.

Scope, definitions, and policy structure

Start your policy by defining scope (who and what is covered), device categories (corporate-owned, BYOD, contractor-owned, managed third-party), and the data types in scope (FCI, internal-only, public). Specify roles (device owner, IT administrator, security officer) and the approval/exception process. For Compliance Framework mapping, include a short table or appendix that maps each policy clause to FAR 52.204-21 and CMMC AC.L1-B.1.III — this makes audits faster and demonstrates intent-to-comply.

Technical controls and standards to enforce

Make the policy prescriptive about minimum technical controls: require device encryption (AES-256 or OS-native full-disk encryption), device lock with timeout and passcode (minimum 6-digit or biometrics), enforce OS minimums (e.g., iOS >= latest two major versions, Android security patch within 90 days), and mandate TLS 1.2+ for all network communications. Specify Mobile Device Management (MDM) or Enterprise Mobility Management (EMM) requirements for enrolled devices (examples: Microsoft Intune for Windows/iOS/Android, Jamf for macOS/iOS) and require conditional access with MFA via SAML/OAuth when accessing corporate resources. On network side, enforce separate SSID/VLAN for BYOD with client isolation, and apply NAC (Meraki, Aruba ClearPass, Ubiquiti with RADIUS) to check device posture before granting access.

Enrollment, identity, monitoring, and remote actions

Document how devices enroll and how identities are bound to devices: use certificate-based authentication (SCEP/ENROLL) where possible, integrate with cloud identity providers (Azure AD Conditional Access, Okta), and require MFA for access to FCI systems. Specify logging and monitoring requirements: enable endpoint logging, forward logs to a SIEM or cloud log service with retention of at least 90 days for access logs relevant to FCI, and define alerting thresholds (e.g., multiple failed logins, jailbreak/root detection, device non-compliance). Include remote-wipe and selective-wipe procedures and the legal/operational conditions under which IT may invoke them.

Third-party devices and vendor access controls

For third-party or subcontractor devices, require contract clauses that mandate the same baseline controls and that vendors provide evidence (attestation, screenshots, or MDM enrollment proof). Where vendors cannot enroll devices in your MDM, require access through hardened jump hosts or vendor portals that isolate vendor activity and limit data exports. Example: a small 20-person contractor allows a subcontractor engineer temporary VPN access only from a company-managed jump server, uses time-bound credentials, logs all session activity, and requires the subcontractor to sign an addendum to the prime contract mandating FAR/CMMC-equivalent protections.

Implementation plan and a small-business scenario

Practical rollout steps: 1) identify all current BYOD/third-party devices via an asset discovery sweep, 2) classify devices and data flows, 3) implement an MDM pilot with 10% of staff using Intune or a comparable EMM, 4) create a lightweight enrollment playbook and employee AUP (acceptable use policy), and 5) enforce network segmentation using a cloud-managed firewall (Cisco Meraki or Ubiquiti) that separates corporate and guest/BYOD traffic. Example: a 15-person subcontractor implemented Intune, required MDM enrollment for any device accessing email or file shares, used Azure AD Conditional Access to block unmanaged devices, and reduced remote-wipe incidents to zero after training and enforcement policies were implemented.

Compliance tips, best practices, and risk mitigation

Best practices: apply least privilege for device access, require role-based access control (RBAC) and time-bound access for vendors, document exceptions and approval workflows, and maintain a POA&M for any gaps. Run quarterly device posture scans, annual policy reviews, and employee training tied to policy changes. Maintain an incident response playbook with BYOD-specific steps (isolate device, capture logs, determine data exposure, and execute wipe if authorized). Not implementing these controls increases risk of data exposure, failure to pass FAR self-attestation or CMMC assessments, civil penalties, and loss of contracts.

In summary, a compliant BYOD and third-party device policy aligned with FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.III) must be scoped and documented, enforce minimum technical controls (encryption, MDM, MFA, network segmentation), include vendor contractual controls, and be supported by enrollment, monitoring, and an audit trail; small businesses can implement these controls incrementally with cloud services and documented procedures to significantly reduce risk while meeting Compliance Framework requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes