🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Multi-Factor Authentication for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI Compliance: A Technical Checklist

Step-by-step technical checklist to deploy and enforce multi-factor authentication (MFA) for FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI compliance in small business environments.

March 28, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-factor authentication (MFA) is one of the most straightforward, high-value controls you can implement to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI) expectations: it reduces account takeover risk by requiring more than a single secret for access to systems and data, and this post provides a technical, actionable checklist you can use to deploy and enforce MFA across your small business environment.

Implementation planning (Compliance Framework perspectives)

Start by mapping the Control IA.L1-B.1.VI requirement to your Compliance Framework inventory: identify accounts in scope (all human user accounts accessing contractor information systems handling Federal Contract Information / FCI), enumerate entry points (email, cloud consoles, VPN, RDP/SSH, SaaS apps), and record current authentication methods. Create a minimal scope for “Phase 1” (admins, remote access, cloud consoles) and a full scope for “Phase 2” (all employees, legacy systems). Document the implementation approach, acceptance criteria, and roll-back plan in your compliance evidence repository.

Technical checklist — required configuration steps

Follow these steps as a checklist when implementing MFA for compliance: 1) Choose acceptable factors (authenticator apps, FIDO2 hardware tokens, OTP tokens) and explicitly disallow or deprecate weak factors (SMS and email OTP where possible). 2) Configure your identity provider (IdP) to require MFA at sign-in for in-scope users or create Conditional Access policies that require MFA for risky or privileged sign-in events. 3) Force MFA registration within a short window and log registrations to evidence compliance. 4) Integrate MFA with VPN/RADIUS, SSH, and on-prem services via SAML/OIDC or RADIUS proxies—avoid special-case bypasses except managed ‘break glass’ accounts. 5) Enable logging/alerting for failed/suspicious MFA events and retain logs per contract requirements. 6) Test with a representative user group before organization-wide enforcement.

Platform-specific examples for a small business

Azure AD (small-business path): Use Security Defaults (free) to enable baseline MFA for privileged accounts, or use Conditional Access (Azure AD P1) to require MFA for all interactive logins to cloud apps. Enforce registration by setting up the "Enable modern authentication" and "Require multifactor authentication" policies, and require users to register Microsoft Authenticator or FIDO2 keys. Example steps: enable Security Defaults in Azure AD portal → require MFA registration → create Conditional Access policy to exempt only emergency/privileged break-glass accounts. Okta / Google Workspace: enable enforced 2-Step Verification, define allowed factors (TOTP apps, FIDO keys), and set an enforcement date. For Google Workspace: Admin console → Security → 2-step verification → Set enforcement and require backup codes storage policy.

Securing native services and legacy protocols (SSH, VPN, RDP)

SSH: don't rely on password + MFA alone—prefer public-key + MFA. For small Linux fleets, install Duo Unix or Google Authenticator PAM and configure SSHD to require both public key and keyboard-interactive authentication. Example (Ubuntu): apt install libpam-google-authenticator; in /etc/pam.d/sshd add "auth required pam_google_authenticator.so"; in /etc/ssh/sshd_config set "AuthenticationMethods publickey,keyboard-interactive:pam" and restart sshd. VPN: integrate with your IdP via SAML or deploy a RADIUS proxy that forwards to your MFA server (Duo, Azure MFA NPS extension). RDP: use RD Gateway with NPS + Azure MFA or require smartcard/FIDO2 via Windows Hello for Business for remote desktop sessions. Always test service accounts and automation flows that cannot handle interactive MFA—migrate these to certificate-based or service principal patterns.

Operational controls, logging and evidence for auditors

Documented operational controls and telemetry are essential evidence for Compliance Framework audits. Enable and export authentication logs from your IdP (Azure AD sign-in logs, Google Workspace audit logs, Okta System Log) and centralize them in a log store (SIEM or cloud log bucket). Create queries/alerts for suspicious patterns: repeated MFA failures, new device registration spikes, or bypass token usage. Maintain an MFA registration report showing enrolled factors, deployment dates, and exceptions. Keep a “break-glass” procedure and store emergency credentials/hardware keys in a hardened secure vault (HSM-backed or compliant password manager) with strict access approval and rotation schedules.

Risk of not implementing MFA (practical implications)

Not implementing MFA leaves your organization exposed to credential-stuffing, phishing, and social engineering attacks that commonly result in account takeover. For small contractors, a single compromised mailbox or cloud console can lead to data exfiltration, contract sanctions, or loss of trust with DoD customers. From a compliance point of view, failure to meet IA.L1-B.1.VI can result in corrective action plans, increased monitoring, or loss of contracts; from a security point of view, it materially increases the likelihood and impact of breaches.

Best practices, tips and common pitfalls

Prioritize high-risk accounts first (administrators, finance, engineering with access to code and cloud resources). Use phishing-resistant factors (FIDO2/WebAuthn) for privileged roles where practical. Avoid SMS for MFA and ensure backup codes are tracked—require secure storage and single-use only. Handle exceptions explicitly: maintain an exception register with business justification, compensating controls, and expiration dates. Train users with short role-based sessions on MFA enrollment and phishing simulations. Plan for device loss by providing documented MFA recovery workflows: temporary access tokens, secondary factors, and administrator-assisted recovery that is logged and approved.

Summary

To meet FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.VI expectations, implement MFA across all in-scope accounts using phishing-resistant factors where possible, enforce registration and sign-in policies at the IdP, integrate MFA into VPN/SSH/RDP workflows, centralize logging for audit evidence, and document exception and break-glass processes. For small businesses, focus first on privileged and remote-access pathways, choose practical vendor solutions (Security Defaults, Duo, Okta, Google Workspace) and follow the checklist above to build a repeatable, auditable MFA posture that addresses both compliance and real-world attack risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes