🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Build an AC.L1-B.1.III Compliance Checklist (FAR 52.204-21 / CMMC 2.0 Level 1) for Controlling External System Access

Step-by-step checklist and practical controls to meet AC.L1-B.1.III for controlling external system access under FAR 52.204-21 and CMMC 2.0 Level 1.

β€’
March 25, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows how to build a practical, evidence-focused AC.L1-B.1.III compliance checklist aligned with FAR 52.204-21 and CMMC 2.0 Level 1 to control external system access β€” designed for small businesses that must protect Federal Contract Information (FCI) and meet basic cyber hygiene requirements.

Understanding AC.L1-B.1.III in the Compliance Framework Context

At a high level, AC.L1-B.1.III addresses controlling and restricting connections between your systems and external systems or services so that only authorized, documented, and secured channels are used. For organizations subject to FAR 52.204-21 and CMMC 2.0 Level 1, this means demonstrating the ability to identify external connections, apply least privilege and segmentation, use secure authentication, and maintain records showing controls are in place and reviewed. Treat this practice as a combination of network controls, access control policy, and procedural evidence (inventory, approvals, configuration baselines, and logs).

Step-by-step Compliance Checklist β€” Practical Implementation

1) Inventory and Categorize External Connections

Start with a written inventory (spreadsheet or CMDB) listing every external connection: SaaS applications, vendor remote maintenance, APIs, partner VPNs, cloud peering, and inbound ports exposed to the internet. For each item record: purpose, owner, protocol/ports, authentication method, data types (e.g., FCI), and contract or PO reference. Example: a small engineering firm should list its contractor-managed CAD SaaS, the third-party backup vendor, and the remote RMM tool used by an IT MSP β€” documenting which store or process FCI.

2) Apply Technical Controls β€” Network & Access Configuration

Implement deny-by-default network policies and allow only required flows. Practical controls: firewall/NGFW rules that restrict inbound traffic to specific IPs and ports (e.g., allow only TCP/443 to the public web server), egress filtering to block unknown outbound channels, and VLAN/segmenting of systems that process FCI. In cloud: use Security Groups/NSGs with least privilege, and limit management plane access to a jump host. Use MFA for all remote access and prefer SSO with conditional access where available. Example configuration: an AWS Security Group policy that allows SSH (22) only from your corp office IPs and forces SSM Session Manager for console access rather than open SSH to the internet.

3) Secure Remote Access and Third-Party Connections

Require documented approvals and a vendor access agreement before granting any external party network or system access. Use VPNs with strong crypto (TLS 1.2+), client certs, and MFA, or cloud-native secure tunnels (e.g., bastion + session recording). For maintenance vendors, isolate their sessions to a jump host or virtual desktop with time-limited credentials. Real-world small business scenario: a printer vendor needs access β€” instead of giving open VPN credentials, create a time-boxed user account, restrict access to the printer management VLAN, and log the session.

4) Logging, Monitoring, and Evidence Collection

Enable and centralize logging for firewalls, VPNs, proxy servers, and authentication systems. At minimum, capture connection source IP, destination, port, username/account, timestamps, and action (allowed/denied). Retain logs long enough to support investigations and audits (a practical minimum for small shops is 90 days; increase if contractually required). Produce simple evidence artifacts: the inventory, screenshots of firewall rules, VPN access logs showing vendor connections, and a monthly review sign-off by the system owner. Use low-cost SIEM alternatives like managed logging (CloudWatch, Azure Monitor, or a small Splunk/ELK setup) if budget allows.

5) Policies, Approvals, and Periodic Review

Document a short policy (1–2 pages) describing how external connections are approved, who may approve them, and the required technical controls (MFA, segmentation, logging). Implement a change-control step: any new external connection must be recorded, reviewed by IT/security, and approved by the contract owner. Schedule periodic reviews (quarterly) to validate the inventory, verify firewall rules still match business needs, and confirm that inactive or stale access is removed. For CMMC evidence, keep approval forms, review meeting minutes, and change tickets.

Risk If You Don’t Implement AC.L1-B.1.III Controls

Failing to control external system access puts FCI at risk of unauthorized disclosure and increases the chance of ransomware, lateral movement, and supply-chain incidents β€” which can lead to contract termination, reputational damage, and possible financial penalties. Small businesses commonly misconfigure cloud services or leave vendor access persistent; these are frequently exploited paths for data exfiltration. From a compliance standpoint, lack of documented inventory, approvals, and logs will lead to failing an assessment against FAR 52.204-21/CMMC L1.

Compliance Tips and Best Practices

Keep your checklist pragmatic: prioritize high-risk external connections (vendors with privileged access, internet-facing management interfaces) and automate checks where possible (scripted rule drift detection, automated inventory via cloud APIs). Use templates: a vendor access request form, firewall rule change form, and a logging evidence packet to collect during audits. Train staff on the approval process β€” ensure helpdesk or ops don’t bypass documentation to β€œsave time.” Finally, use principle of least functionality: if a vendor only needs HTTPS for an API, don’t open SMTP or RDP ports.

In summary, an AC.L1-B.1.III compliance checklist for controlling external system access should combine a verified inventory, deny-by-default network and access controls, secure vendor access processes, centralized logging with retained evidence, and a documented approval/review process. For small businesses, practical choices (time-boxed credentials, simple cloud-native logging, basic segmentation) provide strong protection without heavy overhead β€” and produce the artifacts auditors and assessors expect under FAR 52.204-21 / CMMC 2.0 Level 1.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes