🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Firewalls, IDS/IPS, and TLS to Protect Organizational Communications: Implementation Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X

Practical, step-by-step checklist for configuring firewalls, IDS/IPS, and TLS to meet FAR 52.204-21 and CMMC 2.0 Level 1 communication protection requirements.

•
March 25, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, implementation-oriented checklist for configuring firewalls, intrusion detection/prevention systems (IDS/IPS), and TLS to protect organizational communications in support of the Compliance Framework requirement mapped to FAR 52.204-21 and CMMC 2.0 Level 1 - Control SC.L1-B.1.X.

Implementation checklist — high level

1) Inventory and policy first

Begin by documenting systems that process or transmit Federal Contract Information (FCI) and the communications flows between them (management, user, partner, cloud). Define an organizational network policy that enforces "least privilege" network access and encryption in transit. For evidence: keep a current inventory, an approved network access policy, and a change-control record showing the policy was reviewed and approved.

2) Firewall configuration (network perimeter and segmentation)

Apply "default deny" at the perimeter and inside the network for segmentation between user, server, and DMZ zones. Practical steps: implement zone-based rules (management, internal, DMZ), block all inbound by default, only allow inbound services explicitly (e.g., TCP/443 to the public webserver). Example small-business commands for a Linux gateway using UFW: ufw default deny incoming; ufw allow proto tcp from 203.0.113.10 to any port 22 comment 'admin jump host'; ufw allow 443/tcp; ufw enable. For iptables: add specific ACCEPT rules then add a final DROP - iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT followed by explicit accept rules and then iptables -A INPUT -j DROP. Maintain a human-readable firewall rule set export (time-stamped) for audit evidence, include rule justification and owner for each rule, and avoid overly broad allow rules (e.g., 0.0.0.0/0 to ports other than 80/443/required service ports).

3) IDS/IPS placement, configuration, and tuning

Decide sensor placement: IDS on a passive TAP/span for detection (low risk) and IPS inline for blocking (higher risk). Small businesses can deploy Suricata or Snort; OPNsense/pfSense appliances can host Suricata on the LAN-to-internet link. Configure signature updates (Emerging Threats/ET Open or ET Pro) and enable protocol inspection (HTTP, TLS handshake analysis). Tune rules to reduce false positives by creating suppress/rule-whitelist lists for known benign hosts. Forward IDS/IPS alerts to a central log/SEIM (even a hosted log collector) and keep retention for at least 90 days — export a sample week of alerts and the sensor config as evidence for compliance reviews.

4) TLS configuration and certificate management

Enforce TLS for all web, API, and management interfaces. Accept only TLS 1.2 and 1.3, preferring TLS 1.3 where possible. Example recommended TLS settings: enable TLSv1.2 and TLSv1.3, prefer ECDHE key exchange, and allow secure ciphers such as TLS_AES_128_GCM_SHA256 and TLS_AES_256_GCM_SHA384 (TLS1.3) and ECDHE-ECDSA-AES256-GCM-SHA384 / ECDHE-RSA-AES128-GCM-SHA256 (TLS1.2). Disable weak algorithms (SSLv3, TLS 1.0/1.1, RC4, 3DES, NULL ciphers). Use certificates with 2048-bit RSA or ECC P-256 keys; automate issuance and renewal with Let's Encrypt or your CA via ACME and monitor certificate expiration with alerts. Validate TLS with tools like testssl.sh or Qualys SSL Labs and store the test results as compliance evidence. For management interfaces, limit access to specific IPs and require mutual TLS (mTLS) where feasible.

Operational controls and evidence collection

Logging, monitoring, and documentation

Collect firewall logs (accept/deny), IDS/IPS alerts (with full packet captures on suspicious events if privacy policy allows), and TLS handshake errors. Centralize logs (syslog/SIEM) to generate correlation rules (e.g., repeated denied SSH attempts + IDS alert => incident). Retain logs and a copy of the relevant policy/config for at least the period specified by organizational policy; CMMC Level 1 / FAR 52.204-21 expect documented safeguarding practices and demonstrable controls. Prepare artifact bundles for auditors: exported firewall rule set (timestamped), IDS/IPS config and rule-update history, a TLS configuration report, and screenshots or logs showing certificate renewal automation in action.

Small-business, real-world scenarios

Scenario A — Managed service provider (MSP) with FCI access: Host a contract portal in a DMZ (reverse proxy), enforce TLS 1.3 on the load balancer (AWS ALB or Nginx), and place an IDS sensor on the transit link. Use security groups/NACLs as perimeter firewall equivalents and restrict administrative SSH to a single bastion host with strict source IP allow lists. Scenario B — Small company with on-prem web server: deploy pfSense as gateway + Suricata package, configure default deny, allow TCP/443 to the webserver only, enable HSTS and OCSP stapling on the webserver, and automate certs via Let's Encrypt. Provide auditors the pfSense rule export, Suricata rule snapshot, and a Qualys/SSL Labs grade A report as evidence.

Compliance tips, best practices, and risks of non-implementation

Best practices: maintain a documented change control process for firewall/IDS/TLS changes, schedule quarterly rule reviews, enforce multi-factor authentication for administrative access, and run periodic vulnerability scans and a yearly penetration test. For IDS/IPS, maintain an incident response playbook that ties alerts to escalation steps. Risks of not implementing these controls include unauthorized disclosure or modification of FCI, data exfiltration via unmonitored channels, contract termination or disqualification from future procurements, and reputational and financial damage. Even small misconfigurations (e.g., expired TLS certificates or overly permissive firewall rules) have caused service outages and breaches that led to regulatory and contractual consequences.

Summary: To meet the Compliance Framework requirement under FAR 52.204-21 / CMMC 2.0 Level 1 (SC.L1-B.1.X), implement an auditable combination of properly hardened firewalls (default deny, segmentation), tuned IDS/IPS (sensor placement, signature management, alerting), and robust TLS (TLS1.2/1.3, secure ciphers, certificate automation). Maintain documentation, exports, logs, and test results as evidence, schedule regular reviews, and apply the principle of least privilege to communications flows — these concrete steps will materially reduce network risk and create the artifacts auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes