🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an MFA and SSO Implementation Plan for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI (Checklist & Configs)

Step-by-step plan, checklist, and sample configurations to implement MFA and SSO to meet FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.VI requirements for small businesses.

•
April 17, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing Multi-Factor Authentication (MFA) and Single Sign-On (SSO) is one of the most effective, practical controls a small contractor can deploy to meet FAR 52.204-21 and the mapped CMMC 2.0 Level 1 practice IA.L1-B.1.VI; this post gives a step-by-step implementation plan, real-world small-business scenarios, an actionable checklist, and concrete configuration examples for common platforms.

Understanding the requirement and scope

The Compliance Framework practice mapped to FAR 52.204-21 / CMMC 2.0 Level 1 requires basic identity and access controls for Federal Contract Information (FCI) stored or processed on contractor systems. Practically, that means authenticating users with more than a single factor for interactive access to corporate systems that handle contract data and centralizing authentication where possible (SSO) so policy enforcement and auditing are consistent. For a small business, scope should start with cloud identity (Office 365/G Suite), VPN, RDP/SSH access, privileged admin consoles, and any systems storing contract documents.

Implementation plan (step-by-step)

1) Assess & scope assets and accounts

Inventory identities and how they access systems: cloud apps, on-prem servers, remote access (VPN/RDP/SSH), and privileged accounts. Identify service accounts (non-interactive), break-glass accounts, contractor/third-party access, and shadow IT (apps not centrally managed). Record where passwords alone are the only control — these are your highest priority. Capture counts and owners so you can estimate licensing (MFA/SSO vendor seats), hardware token needs, and user support load.

2) Design policy and choose technology

Create a simple policy: require MFA for all interactive human accounts that access FCI, require phishing-resistant methods for admins (FIDO2 or hardware token), centrally enforce via SSO for SaaS apps, and exclude only documented break-glass accounts which must be tightly controlled and logged. Choose an identity provider based on your ecosystem: Microsoft Entra ID (Azure AD) for Microsoft-centric shops, Google Workspace for GSuite-first, Okta or JumpCloud for neutral multi-cloud support. For MFA enforcement use platform-native Conditional Access (Azure), Okta Sign-On Policies, or Google Context-Aware Access where available; pair with a strong authenticator (push + TOTP + FIDO2) and a secondary method for recovery.

3) Configure, pilot, and validate

Deploy in phases: pilot with IT + power users, then business units, then all employees. Configure SSO for top SaaS apps via SAML/OIDC and enable SCIM provisioning where supported to reduce orphaned accounts. For MFA, set a policy that blocks legacy authentication (IMAP/POP/SMTP/basic auth) or requires app-specific passwords only after mitigating risk. Document break-glass procedures, helpdesk MFA reset workflows (ID verification steps), and logging/alerting for failed or unusual challenge attempts. Test end-to-end: login, app access, device registration, and account recovery.

Practical configuration examples and vendor specifics

Azure AD example: Create a Conditional Access policy named "MFA – All Users (exclude break-glass)". Assign Users: All Cloud Users, Exclude: emergency-admin@yourdomain (break-glass). Cloud apps: All cloud apps. Conditions: Client apps – exclude Exchange ActiveSync if still needed temporarily. Grants: Require multi-factor authentication. Session: Sign-in frequency = 1 day (or adjust for risk). Also enable Security Defaults only if you don't need fine-grained policies. Okta example: Sign On > Add Sign-On Policy: rule "Require MFA" for network zone "Untrusted", factor required: Okta Verify (push) + allow WebAuthn keys for admin group. Google Workspace example: Enforce 2-Step Verification for all users and configure Advanced Protection Program (APP) for privileged accounts. Duo example: Enforce "Duo MFA" for VPN and RDP by integrating with RADIUS/SSO and set device health checks for managed devices.

Linux/SSH and service-account guidance: For SSH, require public-key auth and consider multi-factor for interactive logins via pam_u2f or pam_google_authenticator. Example sshd_config line: AuthenticationMethods publickey,keyboard-interactive:pam. Use short-lived certificates (OpenSSH CA) or use RADIUS-backed MFA for centralized enforcement (FreeRADIUS + Duo). AWS-specific: enable MFA on the root account, require MFA for console IAM users with an IAM policy condition like "Condition": {"Bool": {"aws:MultiFactorAuthPresent": "true"}}, and prefer SAML federation + roles for console access to eliminate long-lived IAM user credentials.

Checklist, monitoring, and risk of non-compliance

Checklist (practical): 1) Inventory accounts & map to FCI systems; 2) Pick IDP/SSO and MFA methods; 3) Configure SSO/SAML for core SaaS apps; 4) Create and test Conditional Access / Sign-On policies; 5) Enroll users in phased pilots; 6) Secure service accounts with keys rotation or short-lived certs; 7) Implement break-glass procedures and hardware tokens for at least two admins; 8) Enable authentication logging (Azure AD sign-in logs, Okta System Log, syslog for VPN) and forward to SIEM or cloud logging with retention to meet audit needs; 9) Document helpdesk flows for lost MFA. The risk of not implementing MFA/SSO includes account takeover, exfiltration of contract data, contract termination, liability for breaches, and failing CMMC assessment or FAR compliance audits. For small businesses, a single compromised account can result in significant remediation costs and loss of future government work.

Compliance tips and best practices for small businesses

Favor simplicity: use the cloud IdP you already pay for (Azure AD or Google Workspace) to reduce integration work. Prioritize phishing-resistant authenticators (hardware tokens) for privileged roles and at least push/TOTP for all users. Use SSO to reduce password reuse and to centralize onboarding/offboarding via SCIM. Keep break-glass accounts offline, store tokens in a safe, and test recovery quarterly. Train users on MFA enrollment and phishing risks to reduce helpdesk load. Finally, instrument alerting for anomalous authentications (new locations, impossible travel, high failure rates) and tie those alerts into your incident response plan.

Summary: For FAR 52.204-21 / CMMC 2.0 Level 1 compliance, a pragmatic MFA + SSO implementation focused on scoping, phased rollout, centralized policy enforcement, and logging will deliver effective protection for FCI while remaining affordable for small businesses — use the checklist above, leverage your existing IdP, require MFA for all interactive accounts, secure service accounts, and maintain documented break-glass and recovery processes to satisfy assessors and protect your contracts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes