🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build Audit Logs for Physical Access: Step-by-Step Implementation for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.IX

Practical, step-by-step guidance to design, collect, secure, and review physical access audit logs to meet FAR 52.204-21 and CMMC 2.0 Level 1 (PE.L1-B.1.IX) requirements.

•
April 02, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a hands-on, step-by-step approach to building reliable audit logs for physical access that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 Control PE.L1-B.1.IX, including technical details, system design choices, sample log schema, implementation checklist, and real-world small business examples to make the requirement practical and actionable.

What this requirement means in practice

At its core, PE.L1-B.1.IX requires organizations to collect and maintain records of physical access events so that access to facilities and areas containing Federal Contract Information (FCI) or controlled unclassified information can be reconstructed and reviewed. For small businesses this means instrumenting doors, server rooms, visitor checkpoints, and any area where sensitive work or storage occurs, then capturing reliable event data (who, what, when, where, event type) and retaining it in a manner that supports review, investigation, and evidence production for audits or incident response.

Step-by-step implementation (practical)

Start by scoping and inventorying: list all controlled areas (server room, development areas, storage cages, desks with sensitive info) and the devices that enforce or record access (badge readers, keypad controllers, mechanical key logs, turnstiles, visitor sign-in tablets, and CCTV). Define a minimum log schema: event_id, timestamp (ISO 8601 / UTC), device_id, reader_id, location_id, credential_id (hashed if PII), person_identifier, event_type (grant/deny/forced-entry/door-held), direction (in/out), and optional video_reference. Ensure all devices can produce or forward logs (syslog, HTTPS APIs, or vendor CSV export) and record time in UTC to avoid timezone issues.

Time, format, and transport details

Enforce accurate timestamps via NTP on controllers and logging collectors (use pool.ntp.org or an internal stratum-2 server). Prefer structured formats: RFC5424 syslog or JSON over HTTPS for easy parsing. Example minimal JSON event you should capture: {"event_id":"evt-000123","timestamp":"2026-04-02T15:04:05Z","device_id":"door-01","location":"ServerRoom","credential_hash":"sha256:3a...","event_type":"access_granted","direction":"in"}. Transport logs securely: syslog over TLS (RFC 5425) or HTTPS with mutual TLS where possible; for cloud-managed readers use vendor API keys and HTTPS endpoints to pull or push logs into your log repository.

Storage, retention, integrity, and access controls

Design a secure log repository: centralize events into an append-only store such as a WORM-enabled object store (S3 with Object Lock), an immutable index in an ELK/Opensearch cluster with restricted write roles, or a managed SIEM that supports immutable retention. Encrypt logs at rest using AES-256 and in transit with TLS. Implement integrity checks by computing SHA-256 digests of log batches and storing hashes separately (or use signed log entries). Apply strict access controls (IAM roles, RBAC) so only authorized personnel can read logs; separate those who can configure/logging ingestion from those who can review or delete logs. Retention: retain logs for a minimum period recommended by policy (commonly 90–365 days for Level 1; confirm your contract) and document retention/removal procedures in policy.

Monitoring, review cadence, and alerting

Define a review process and automated detection: set up daily automated checks for anomalies (e.g., after-hours access, door-forced alarms, repeated badge-denies) with alerts to on-call personnel and monthly manual reviews for sampled events. Integrate video: correlate access events with CCTV clips using a shared event_id or timestamp range; store video references in the log (URI with access controls) rather than embedding binary video. Use a simple rule set for small businesses — e.g., alert if access_granted to server room outside business hours or if a credential has >5 denies in 10 minutes — and log every alert decision to support auditability.

Real-world small business scenario

Example: A 50-person engineering firm with a server room and two secured labs implements cloud-managed badge readers (Brivo/Kisi) for doors, a visitor iPad check-in app, and a DVR/NVR for cameras. They configure readers to push JSON events to a lightweight logging collector (Graylog) hosted on a hardened VM; Graylog forwards compressed daily E-logs to an S3 bucket with Object Lock and stores SHA-256 digests in a small PostgreSQL table. NTP is enforced via an internal NTP VM. Daily automated reports are emailed to the security lead; monthly audits are performed against a checklist that maps events to physical access policy. This architecture is low-cost, auditable, and suitable for contractors handling FCI under FAR 52.204-21.

Compliance tips, best practices, and risks of non-implementation

Best practices: keep the log schema consistent across devices, hash or tokenize PII (badge numbers) when not needed in cleartext, maintain an access-control matrix for logs, automate exports and off-site backups, regularly test log integrity and recovery, and document the logging policy and review procedures. Train front-line staff (reception, facilities) to capture and preserve visitor records and badge incidents. Risks if you fail to implement: inability to reconstruct incidents (data theft, unauthorized facility access), failing contract compliance leading to corrective actions or contract loss, delayed incident response, and legal exposure if a security incident involves mishandled FCI. Auditors will expect demonstrable retention, review activities, and chain-of-custody for logs tied to the contractual period.

In summary, building audit logs for physical access to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.IX is a practical engineering and operational task: inventory devices, standardize an event schema, centralize and secure logs (immutable storage, encryption, integrity checks), implement monitoring and review processes, and document everything. For small businesses, combine affordable cloud-managed readers with a simple central collector and WORM storage to meet both security and compliance objectives while keeping the solution maintainable and auditable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes