🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Build an Access Control Policy for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II: Practical Template and Implementation Steps

Step-by-step guide to build an access control policy that satisfies FAR 52.204-21 and CMMC 2.0 L1 (AC.L1-B.1.II), with templates, technical steps, and small-business examples.

β€’
April 03, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Access control is one of the simplest-sounding but most frequently under-implemented requirements when meeting FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.II): organizations must ensure only authorized users, processes, and devices can access covered contractor information and systems. This post gives a practical access control policy template, step-by-step implementation guidance tailored to a Compliance Framework audience, and small-business examples you can adopt quickly to meet audit expectations.

Why this control matters (and what auditors look for)

The key objective of AC.L1-B.1.II is to limit system access to authorized entities and to demonstrate repeatable, documented processes that enforce that limitation. Auditors will look for a written policy, evidence of enforcement (configurations, logs, role assignments), periodic reviews, and documented provisioning/deprovisioning workflows. For small businesses handling Controlled Unclassified Information (CUI), failing this control can lead to lost contracts, financial penalties, and exposure of sensitive data.

Access Control Policy: high-level template (practical sections)

Below is a practical template outline you can paste into your compliance documentation repository. Each section should be concise, assigned an owner, and version-controlled.

  • Purpose & Scope β€” state that the policy covers all systems that process CUI / contractor information systems per Compliance Framework.
  • Definitions β€” authorized user, privileged account, CUI, covered system.
  • Access Principles β€” least privilege, need-to-know, separation of duties, default-deny.
  • Authentication & Credential Requirements β€” password rules, MFA requirements, SSH key management.
  • Account Provisioning & Deprovisioning β€” request, approval, maximum provisioning timeframe (e.g., 48 hours), immediate revocation on termination.
  • Privileged Access Management β€” PAM usage, session logging, break-glass procedures.
  • Remote & Third-Party Access β€” time-limited accounts, VPN + MFA, vendor account controls.
  • Logging, Monitoring & Review β€” access log retention, monthly user access reviews, privileged account audits.
  • Exceptions & Approval β€” documented exceptions process with compensating controls.
  • Roles & Responsibilities β€” IAM owner, system owner, HR, security officer.

Template snippet (example language)

"All accounts that access covered contractor information must be uniquely attributable to an authorized individual or process. Privileged accounts must use multi-factor authentication and be managed through a privileged access solution. Accounts for departing personnel or contractors will be disabled within 24 hours of termination notification." Use similar concrete sentences in each section so reviewers can match policy to evidence.

Implementation steps β€” practical, ordered actions

1) Inventory and scoping: identify all systems that store, process, or transmit CUI (Azure/Office365 mailboxes, file shares, local servers). 2) Assign owners: designate an IAM owner who owns the policy and an HR liaison for lifecycle events. 3) Define roles and permissions: create a minimal set of roles (employee, contractor, admin) and map permissions to least privilegeβ€”document as role-permission matrix. 4) Implement technical controls: enable MFA, enforce conditional access/zero-trust rules, configure ACLs and group-based permissions. 5) Provisioning/deprovisioning workflow: implement a ticket-based or IAM-automated approval workflow (e.g., ServiceNow, Jira, Azure AD Entitlement Management) with 24–48 hour SLAs. 6) Logging & reviews: enable audit logs (CloudTrail, Office 365 Audit, Windows Security logs), retain for at least 90 days, and schedule monthly user entitlement reviews. 7) Evidence collection: keep screenshots, configuration exports, ticket history, and review reports tied to policy versions for auditors.

Small-business technical examples (real-world)

Example A β€” 25-person engineering firm using Microsoft 365 and Azure AD: implement Conditional Access to require MFA for all sign-ins originating from untrusted networks, place engineering file shares in SharePoint with group-based access, use Azure AD groups for role assignment, and run a monthly "Access Review" in Azure Identity Governance to certify group membership. Example B β€” small dev shop hosting on AWS: use IAM groups with scoped policies (no *:*), enable MFA for the root and all IAM users with console access, store privileged SSH keys in a PAM/vault (HashiCorp Vault or AWS Secrets Manager), and enable CloudTrail + CloudWatch logs with a 90-day retention for access events. Example C β€” hybrid office with Linux servers: disable direct root login (PermitRootLogin no in /etc/ssh/sshd_config), enforce key-based auth, collect sudo logs via rsyslog to a central SIEM, and rotate keys every 180 days or when an employee leaves.

Compliance tips and best practices

Map each policy statement to evidence: for example, policy says "MFA required" β€” evidence = Conditional Access policy screenshot, user MFA status export. Adopt NIST guidance for authentication (SP 800-63B): prefer MFA and longer passphrases rather than frequent forced resets; enforce minimum 8-character passphrase with complexity guidance if you must set complexity. Conduct quarterly entitlement reviews, and automate where possible to reduce human error. Use time-limited access for vendors and contractors (temporary credentials) and ensure that contractor accounts are flagged and reviewed more frequently. Keep an exceptions register with compensating controls documented and approved by the ISSO.

Risks of not implementing this control

Without a usable access control policy and technical enforcement, small businesses face account takeover, unauthorized access to CUI, lateral movement after initial compromise, and possibly credential leakage through contractors. From a compliance perspective, missing or inconsistent access management is one of the most common findings in FAR/CMMC assessments and can lead to corrective action plans, disqualification from bids, or contract termination. Operationally, recovery from credential compromise is expensive: incident response, forensic analysis, notification, and remediation can exceed tens of thousands of dollars for small firms.

Summary and next steps

Start by populating the template above, clearly assigning owners and timelines. Implement the prioritized technical controls: MFA, role-based groups, and automated provisioning/deprovisioning first; add PAM and centralized logging next. Collect and map evidence to each policy statement, run monthly reviews for the first 90 days to refine workflows, and embed access control checks into your onboarding/offboarding processes. With that combination of documented policy, automated enforcement, and demonstrable evidence, you will be well-positioned to meet FAR 52.204-21 and CMMC 2.0 Level 1 expectations for Control AC.L1-B.1.II.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes