🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build Physical and Logical Subnetworks on AWS to Meet SC.L1-B.1.XI (FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.XI) — Hands-On Tutorial

A practical, hands-on guide showing how small businesses can design AWS account/VPC/subnet architectures, networking controls, and monitoring to meet SC.L1-B.1.XI (FAR 52.204-21 / CMMC 2.0 Level 1) basic safeguarding requirements.

April 20, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This tutorial shows step-by-step how a small organization can build physical and logical subnetworks on AWS to satisfy SC.L1-B.1.XI (the basic safeguarding requirement called out by FAR 52.204-21 and mapped to CMMC 2.0 Level 1), including concrete VPC/subnet designs, access controls, monitoring, and real-world examples you can implement today.

What SC.L1-B.1.XI expects (high level)

At Level 1 the Compliance Framework requires basic safeguarding of controlled unclassified information (CUI) from unauthorized access and disclosure. Practically this means you must separate and protect systems that store or process CUI from general-purpose networks, limit network exposure, and have logging/monitoring to detect access. On AWS that translates into account-level isolation, dedicated VPCs and subnets, hardened routing and security group design, and comprehensive logging (CloudTrail, VPC Flow Logs, Config).

Design principles: physical vs logical isolation on AWS

On cloud providers "physical" isolation is proprietary to the provider (you cannot rewire racks) but you achieve equivalent assurance by separating workloads across AWS accounts and optionally using Dedicated Hosts/Instances where contractually needed. "Logical" isolation is implemented with VPCs, subnets, security groups, NACLs, route tables, and managed endpoints. For a small business, the recommended approach to meet SC.L1-B.1.XI is: (1) a separate AWS account for CUI, (2) a dedicated VPC in that account, (3) private subnets for CUI workloads with no direct inbound Internet access, and (4) controlled egress via NAT or proxies plus strict security groups and endpoint-only S3/SNS access.

Hands-on implementation (step-by-step)

Below is a practical blueprint. Replace CIDRs and names to match your environment. For a simple small-business layout use one account for CUI and one for general IT:

1) Create an AWS Organization and a dedicated CUI AWS account. Put guardrails in place with Service Control Policies (SCPs) that restrict regions and disallow deletion of CloudTrail trails.

2) Create a VPC in the CUI account, for example 10.10.0.0/16, and carve subnets per AZ: public (10.10.1.0/24) for bastion/NAT, private-app (10.10.2.0/24) for application servers, private-db (10.10.3.0/24) for databases. Example Terraform snippet:

# Terraform (abbreviated)
resource "aws_vpc" "cui_vpc" {
  cidr_block = "10.10.0.0/16"
  enable_dns_support = true
  enable_dns_hostnames = true
}

resource "aws_subnet" "public_a" {
  vpc_id = aws_vpc.cui_vpc.id
  cidr_block = "10.10.1.0/24"
  availability_zone = "us-east-1a"
  map_public_ip_on_launch = true
}
# create private_app and private_db subnets similarly

3) Networking: attach an Internet Gateway (IGW) only to the public subnet route table, create a NAT Gateway in the public subnet to allow controlled outbound access from private subnets, and create route tables so private subnets route 0.0.0.0/0 to the NAT. Restrict inbound routes to only what is necessary.

4) Access controls: use Security Groups (stateful) for host-level access and NACLs (stateless) as an extra layer. Example SG setup: a "bastion" SG permits SSH from your corporate IP; application SG only allows inbound from bastion SG or an ALB SG on required ports; database SG allows inbound only from application SG on DB port (e.g., 5432). Avoid SSH-open-to-internet patterns — prefer Systems Manager (SSM) Session Manager for shell access without an open port.

Minimize data exposure with endpoints, KMS, and least privilege

Enable VPC Gateway Endpoints for S3 and DynamoDB so private subnets can access S3 without traversing the Internet. Restrict S3 bucket policies to the VPC endpoint and the CUI account. Use a KMS CMK in the CUI account for encryption of S3 and EBS volumes and set key policies to limit administration and usage to authorized roles only. Example S3 bucket policy snippet limiting access to a VPC endpoint:

{
  "Version":"2012-10-17",
  "Statement":[
    {
      "Effect":"Deny",
      "Principal":"*",
      "Action":"s3:*",
      "Resource":["arn:aws:s3:::cui-bucket","arn:aws:s3:::cui-bucket/*"],
      "Condition":{
        "StringNotEquals":{
          "aws:sourceVpce":"vpce-0123456789abcdef0"
        }
      }
    }
  ]
}

Logging, monitoring, and evidence-gathering

Turn on CloudTrail with multi-region logging and send logs to a dedicated, immutable S3 bucket with MFA Delete (where supported) and a retention/back-up policy. Enable VPC Flow Logs for the CUI VPC and ship to CloudWatch Logs or S3 for retention. Enable AWS Config with rules that monitor for public S3 buckets, public security groups, and whether encryption is enabled; use GuardDuty for threat detection. These controls provide the audit evidence required by FAR 52.204-21 and CMMC assessments.

Real-world small business scenario

Example: a 10-person subcontractor storing CUI for a prime. They create a single CUI account and the described VPC: no Internet-facing app servers, all management done through SSM and an approved bastion in a hardened management VPC. S3 contains CUI artifacts accessible only via VPC endpoint, and a KMS key rotates annually. Automated Terraform modules create the VPC, subnets, NAT, endpoints, and security groups, and a CI job validates AWS Config rules before changes are applied. This setup is low-cost (one NAT gateway, one small RDS instance) and meets the intent of SC.L1-B.1.XI for separation and evidenced control.

Risks of non-implementation and compliance pitfalls

If you don't implement physical or logical separation you increase the risk of accidental exposure and unauthorized access — e.g., a public security group or misconfigured S3 bucket could leak CUI. Non-isolated accounts make it harder to revoke access, produce audit logs, or demonstrate chain-of-custody during an assessment. Consequences include contract termination, inability to compete for government work, reputational damage, and potential regulatory penalties.

Compliance tips and best practices

Automate baseline provisioning with Terraform or CloudFormation and include AWS Config rules and GuardDuty. Use IaC for repeatable evidence in assessments. Prefer SSM Session Manager over SSH, restrict IAM with least privilege, enforce MFA for all human users, and rotate keys and access tokens. Maintain up-to-date network diagrams and a Controls Implementation Summary (mapping architecture elements to SC.L1-B.1.XI). Schedule quarterly reviews of security groups and a monthly review of VPC Flow Logs for anomalies.

In summary, meeting SC.L1-B.1.XI on AWS is achievable for small businesses by combining account-level separation (physical-equivalent isolation), a dedicated VPC with well-designed private subnets (logical isolation), endpoint-only service access, strict SG/NACL rules, centralized logging, and automated guardrails. Implement the blueprint above, document decisions, and automate evidence collection to make assessments straightforward and reduce risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes