🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Access-Control Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.VIII to Restrict Equipment and Operating Environments

Practical, step-by-step checklist and real-world guidance to implement access controls that restrict equipment and operating environments to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small businesses and contractors can build a practical access-control checklist to satisfy FAR 52.204-21 basic safeguarding expectations and the CMMC 2.0 Level 1 practice PE.L1-B.1.VIII (restricting equipment and operating environments), focusing on concrete steps, evidence you can collect, low-cost technical controls, and risk mitigation tactics you can implement this week.

Scope and objectives

Begin by scoping: identify where Controlled Unclassified Information (CUI) or other covered contractor information is stored, processed, or transmitted, and which equipment and operating environments are in scope. The objective of the checklist is to prove that only authorized devices and environments are used for covered work, that unauthorized peripherals and networks are blocked, and that physical and logical controls are documented and enforced. Evidence should map directly to the Compliance Framework practice and to your contract clauses.

Practical checklist — discovery and policy

Checklist item 1 (Inventory and data-flow): maintain a device inventory (CSV or asset database) that lists serial numbers, OS, owner, assigned user, location, and CUI access rights. Checklist item 2 (Policy definition): publish an "Equipment & Operating Environments" policy that states approved devices, allowed networks, minimum OS builds, approved peripherals (e.g., no USB storage unless encrypted and authorized) and specifies where CUI may be processed (e.g., only on corporate VLANs or company laptops). Checklist item 3 (Scope evidence): capture a data-flow diagram that shows CUI entry points, processing endpoints, and storage locations and link each device in the inventory to the diagram.

Practical checklist — physical controls

Checklist item 4 (Designated areas): designate rooms or work zones where covered work is allowed; control access with locks, badge readers, or keyed entry and post signage. Checklist item 5 (Visitor controls): maintain a physical visitor log or electronic check-in, require escorts in sensitive areas, and collect ID when necessary. Checklist item 6 (Environmental protections): ensure equipment is physically secured using cable locks or rack locks, and implement tamper-evidence for laptops and removable media storage—collect photographic evidence and a facility floorplan to show the areas and controls in place.

Practical checklist — technical controls

Endpoint and network controls

Checklist item 7 (Device hardening and enrollment): require corporate devices for covered work and enroll them in an MDM (e.g., Microsoft Intune, Jamf) with device compliance checks: block jailbroken/rooted devices, enforce disk encryption (BitLocker with TPM+PIN or FileVault), enforce screen lock timeout, and restrict local admin rights. Checklist item 8 (Network segmentation and access control): separate CUI traffic on a dedicated VLAN or SSID, enforce 802.1X network access control with RADIUS and EAP-TLS where feasible, and use NAC rules to block noncompliant devices. For small businesses without 802.1X, document compensating controls such as a dedicated wired VLAN and strong WPA3-Enterprise for Wi‑Fi, plus VPN with certificate-based authentication for remote access.

Operational controls and evidence collection

Checklist item 9 (Peripherals and removable media): disable USB mass-storage by GPO or MDM, allow only encrypted, registered removable devices, and log USB events centrally. Checklist item 10 (Monitoring and change control): enable endpoint logging (Windows Event Forwarding/Syslog), retain logs for the contract-defined period, and show change-control records when you modify approved equipment lists or policies. Collect artifacts: inventory export, MDM compliance reports, NAC logs showing denied connections, photos of locked rooms, policy documents, training acknowledgements, and sample audit reports to demonstrate implementation.

Small-business scenarios and low-cost implementations

Example A: a 12-person engineering subcontractor can meet requirements by issuing 6 company laptops, enrolling them in Intune and enforcing BitLocker, creating a dedicated VLAN for CUI on a managed switch, and using a simple badge lock for the server room; evidence is the Intune enrollment report, BitLocker recovery key log, VLAN configuration screenshot, and a photo of the locked door. Example B: a home-office contractor can restrict processing by using a company laptop for CUI, disabling personal device access with strict VPN conditional access, and tagging the laptop in the asset inventory; evidence includes VPN logs, MDM reports, and a signed policy acknowledging single-device use for CUI.

Risk if you don't implement these controls and closing summary

Failing to restrict equipment and operating environments increases the risk of accidental data exposure, unauthorized copying of CUI via removable media, malware infection from unmanaged devices, and audit failures that can lead to contract loss, remedial action, or reporting to contracting officers. Implementing the checklist items above yields clear, demonstrable evidence for FAR 52.204-21 and CMMC 2.0 Level 1 assessments: device inventory and enrollment reports, network/NAC logs, access-control photos, policies, and training records.

Summary: build a compact, evidence-driven access-control checklist by scoping covered locations and devices, enforcing simple physical and technical controls (MDM, disk encryption, VLAN/NAC), collecting specific artifacts (inventory CSV, MDM/NAC logs, photos, policy acknowledgements), and documenting procedures and changes; this approach gives small businesses a practical pathway to meet the Compliance Framework practice and to demonstrate compliance during audits and assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes