🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a BYOD Policy That Satisfies NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.18: Control connection of mobile devices (Template + Implementation)

Step-by-step guidance and a ready-to-adapt BYOD policy template to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 AC.L2-3.1.18 for controlling mobile device connections.

•
April 20, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Controlling how mobile devices connect to your systems is a core requirement under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (AC.L2-3.1.18); this post explains what that control really means, offers practical implementation steps tailored to small businesses, and provides a ready-to-adapt BYOD policy template plus real-world examples so you can quickly achieve and demonstrate compliance.

Understanding the requirement

The control AC.L2-3.1.18 requires organizations to control the connection of mobile devices to organizational systems—this includes both corporate-owned and personally owned (BYOD) devices that access Controlled Unclassified Information (CUI) or other sensitive assets. Key objectives are to ensure only authorized devices connect, enforce minimum-security posture, isolate or restrict untrusted connections, and maintain an auditable record of device connections. For small businesses, "control" usually means implementing combination controls: policy (who can connect and under what terms), technical enforcement (MDM/NAC/conditional access), and operational processes (inventory, onboarding, offboarding, and incident response).

Practical implementation steps (high-level)

Start with a scoped inventory and risk assessment: identify where CUI resides, which services can be accessed by mobile devices (e-mail, SharePoint, RDP, VPN), and the level of risk for each access path. Classify access as high-risk (direct access to CUI stores or admin consoles), medium-risk (corporate e-mail and SharePoint), or low-risk (public internet access). This classification drives controls: high-risk access should be prohibited from BYOD, medium-risk may be allowed only with managed-device controls, and low-risk can remain open with standard protections.

Deploy layered technical controls. Use a cloud MDM/Endpoint Management (e.g., Microsoft Intune, Jamf, VMware Workspace ONE, or Cisco Meraki Systems Manager) to enforce device compliance policies such as device encryption, OS minimum versions (for example, iOS >= 16, Android >= 13 where practical), device passcode complexity, jailbreak/root detection, and encryption of local storage (FileVault/BitLocker/Secure Enclave). Combine MDM with Conditional Access (Azure AD Conditional Access, Okta, or equivalent) to block access to corporate resources unless the device is enrolled and compliant. For network-level enforcement, implement Network Access Control (NAC) or 802.1X + RADIUS with distinct VLANs and firewall rules to isolate BYOD traffic from CUI-bearing segments.

Practical technical configurations you can apply today include: configure your Wi‑Fi to use 802.1X (EAP-TLS or PEAP with MSCHAPv2 as fallback) and issue device or user certificates via SCEP/Intune Certificate Connector, enable MDM-issued device compliance checks in Conditional Access policies to require "Compliant device" for access to Exchange Online/SharePoint, restrict legacy authentication, require TLS 1.2+, and force VPN with split-tunnel disabled for connections to CUI systems. For small shops that cannot afford full MDM, use managed e-mail profiles (MAM) and enforce multi-factor authentication (MFA) and app-level encryption as a compensating control while planning MDM adoption.

BYOD policy template (ready-to-adapt)

Purpose: This policy defines requirements and procedures for personally owned mobile devices that connect to [Organization]'s networks or access CUI, ensuring secure connections, protecting confidentiality, and enabling compliance with NIST SP 800-171 Rev.2 / CMMC 2.0 AC.L2-3.1.18. Scope: Applies to all employees, contractors, and third parties with BYOD that connect to corporate Wi‑Fi, VPN, e-mail, or applications. Roles and responsibilities: Device owner must enroll device in the approved MDM, accept privacy disclosure and remote-wipe consent, and follow security requirements; IT is responsible for onboarding, enforcing compliance, and offboarding devices; Security Officer maintains records and performs audits. Requirements: All BYOD must be enrolled in [chosen MDM] before access to corporate resources; devices must have enforced encryption, screen lock/PIN (minimum length/config), OS version at or above approved baseline, jailbreak/root detection enabled, MDM profile active, and remote-wipe capability permitted; access to CUI is restricted to company-managed devices only unless an approved exception exists; corporate data will use containerization or managed apps where possible and MAM-based selective wipe will be used on termination.

Implementation checklist and small-business scenarios

Checklist for rollout: 1) Map CUI assets and decide which services are BYOD-allowed; 2) Choose an MDM and Conditional Access solution (e.g., Intune + Azure AD for simple integration with Microsoft 365); 3) Configure Wi‑Fi 802.1X and segregated VLANs for BYOD; 4) Create device compliance profiles (encryption, passcode, minimum OS, jailbreak detection, auto-lock); 5) Define enrollment process and consent forms; 6) Implement remote-wipe and selective-wipe workflows; 7) Train staff and publish the BYOD policy; 8) Audit device inventory and access logs quarterly. Example scenario: A 25-person engineering firm using Microsoft 365: implement Intune (included with Microsoft 365 Business Premium), enforce device compliance for Exchange and SharePoint via Conditional Access, prohibit BYOD access to development servers and require corporate laptops for that segment, while allowing managed mobile mail and Teams on BYOD with selective wipe and DLP policies.

Compliance tips and best practices: include privacy language and explicit user consent in the policy to address employee expectations, keep an accurate device inventory and central audit logs (use Azure AD sign-in logs or your SIEM), and document exception approvals with compensating controls. Use least-privilege network segmentation: place BYOD on a guest VLAN with tightly controlled firewall rules and only allow specific application-level access through reverse proxies or App Gateway. Regularly test controls by performing access attempts from non-compliant devices and document the results for your assessors. For small businesses, prefer vendor-managed services (e.g., cloud MDM) to minimize operational overhead and keep an eye on licensing costs—often a single Microsoft 365 Business Premium seat supplies a cost-effective stack for Intune + Conditional Access.

Risk of not implementing AC.L2-3.1.18: failing to control mobile device connections increases the risk of unauthorized CUI exfiltration, lateral movement from compromised personal devices into corporate networks, and non-compliance findings during audits that can lead to contract loss or penalties. For small businesses, a single lost or jailbroken BYOD device with cached credentials can lead to a breach that damages reputation and removes the ability to bid on federal contracts. Additionally, absent device control, incident response becomes slow and forensic evidence may be incomplete because device logs and remote-wipe capabilities were never established.

In summary, meeting NIST SP 800-171 Rev.2 / CMMC 2.0 AC.L2-3.1.18 requires a combination of clear BYOD policy, technical enforcement (MDM, Conditional Access, NAC/802.1X, segmentation), and operational processes (inventory, onboarding/offboarding, audits). Start with a risk-based scope, use managed cloud tooling appropriate for your budget, require enrollment before access, and document everything—including exceptions—to produce evidence for assessors. The included template and checklist give a practical starting point to operationalize the control in a small-business environment while keeping security and privacy balanced.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes