🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Practical Access Control Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I Compliance

Step-by-step guidance and a practical checklist to implement access control (AC.L1-B.1.I) for FAR 52.204-21 and CMMC 2.0 Level 1 compliance, with small-business examples and technical tips.

•
April 18, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting the access-control expectations of FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.I) boils down to a few practical steps: identify who should have access, enforce unique authenticated access, document and automate provisioning/deprovisioning, and produce evidence for assessors—this post gives a compact, actionable checklist plus implementation details small businesses can use today.

Understanding AC.L1-B.1.I and the key objectives

At its core AC.L1-B.1.I is about limiting system access to authorized users, processes acting on behalf of users, and devices; key objectives include (1) unique identification and authentication of users, (2) least privilege and role separation, (3) timely revocation of access, and (4) demonstrable evidence of controls. For small businesses handling Federal Contract Information (FCI) or controlled unclassified information (CUI) this is the minimum safeguard required to maintain federal contracts and avoid penalties.

Practical access control checklist (Compliance Framework-specific)

Below is a compact checklist oriented to the Compliance Framework: items are actionable, measurable, and produce evidence aligned to auditors' expectations. Implement these and document each step.

  • Inventory all accounts and access points (user accounts, service accounts, shared/local accounts, privileged accounts)
  • Define roles and map privileges (role-based access control or RBAC)
  • Ensure unique user accounts—no shared admin accounts; document exceptions
  • Implement authentication controls (password policy + MFA for remote/privileged access)
  • Create documented onboarding/offboarding workflows with time-bound account provisioning
  • Configure session controls (automatic screen lock, session timeout) and account lockout on failed attempts
  • Enable and collect authentication/access logs and retain evidence (screenshots, log extracts) for reviews
  • Perform scheduled access reviews (monthly or at least quarterly) and retain review records

Implementation notes and evidence you should collect

For each checklist item, create a short SOP and collect at least one piece of evidence: inventory CSV, role mapping spreadsheet, screenshots of group membership and policies, MFA configuration screenshots, ticket records for provisioning/deprovisioning, exported logs showing login events, and signed access-review records. Document retention periods and where artifacts are stored (encrypted repository or secure SharePoint).

Technical implementation examples (small-business focused)

Concrete configurations that small IT teams can implement quickly: using Azure AD or Okta as a central identity provider allows you to enforce MFA and RBAC centrally—create groups for "CUI-Access" and assign resources via group membership. For on-prem Windows environments use Group Policy: set Minimum Password Length ≥ 12, Password Complexity = Enabled, Interactive logon: Machine inactivity limit = 15 minutes, and configure Account Lockout Policy to 5 invalid attempts. For Linux servers: set PermitRootLogin no in /etc/ssh/sshd_config, use public-key authentication (PasswordAuthentication no), enable faillock or pam_tally2 to lock failed attempts, and centralize accounts via LDAP/SSSD if possible. For VPNs, require device certificate + MFA (for example, OpenVPN with client certs and Duo for MFA or a commercial VPN with conditional access).

Real-world small-business scenarios

Scenario 1: A 25-person subcontractor hosting FCI on cloud VMs. Action: centralize users in Azure AD, enforce conditional access to require MFA for any sign-in from unmanaged devices, create an "FCI" Azure AD group, and deploy least-privilege role assignments to cloud storage buckets; evidence: group membership export and conditional access policy screenshot. Scenario 2: A small engineering shop with local file servers. Action: migrate accounts to an on-prem AD, disable local Administrator on workstations, implement GPO session locks and password policy, keep an offboarding ticket for each terminated employee showing account disable timestamp. Scenario 3: Remote-first consultancy: require SSO (Okta or Azure AD) integrating cloud apps, enable MFA and device posture checks, and use time-bound access roles (JIT access) for contractor periods.

Compliance tips, best practices, and automation

Automate where possible: use automation for onboarding/offboarding (HR system integration with IdP) to avoid stale accounts; implement role templates to reduce misconfiguration; use logs forwarding to a simple SIEM or log collector (Splunk, ELK, or a managed service) and configure alerts for anomalous logins (multiple failed attempts, logins outside business hours). Conduct monthly access reviews with managers and store signed records. Consider short-lived credentials for privileged operations and document a "break glass" process for emergency access with after-action tickets.

Risks of non-compliance and what assessors will look for

Failing to implement AC.L1-B.1.I increases risk of unauthorized access, data exfiltration, and disclosure of FCI/CUI—outcomes include contract loss, suspension, fines, and reputational harm. Assessors will look for proof: (a) a written access control policy, (b) inventory of accounts and privileged users, (c) screenshots/configs showing MFA and password/session settings, (d) logs demonstrating enforcement and reviews, and (e) documented provisioning/deprovisioning workflows with timestamps. If you can't produce evidence, assessors treat controls as not implemented even if an informal practice exists.

Summary: Build a simple, repeatable checklist that maps inventory → roles → enforced technical controls → automated workflows → documented evidence. For small businesses, prioritize central identity management, MFA for remote and privileged access, automated offboarding, and scheduled access reviews—these are high-impact, low-cost actions that satisfy AC.L1-B.1.I and reduce real operational risk while producing the artifacts auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes