🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Multi-Factor Authentication to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI for Users, Processes, and Devices

Practical, step-by-step guidance to implement MFA for users, processes, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI requirements, with examples for small businesses.

•
April 04, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure multi-factor authentication (MFA) to satisfy the intent of FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.VI for users, processes, and devices, with practical steps, small-business examples, and the specific technical choices you should document for compliance.

Why MFA is required and the risk of not implementing it

At a high level, FAR 52.204-21 and CMMC 2.0 Level 1 require basic cyber hygiene to protect Controlled Unclassified Information (CUI) and contractor systems; the IA.L1-B.1.VI control emphasizes authentication strength for users, automated processes, and devices. Without MFA you leave credentials as a single point of failure—phished or leaked passwords can enable lateral movement, data exfiltration, ransomware, and loss of contracts or certification. For small businesses working with the DoD, one compromised account can result in a reportable incident, contractual penalties, and lost trust from prime contractors.

Scope: users, processes, and devices — what to cover

Define and inventory three scopes before implementation: (1) human users (employees, contractors, privileged admins), (2) automated processes and service accounts (CI/CD pipelines, scheduled jobs, API clients), and (3) devices/endpoints (workstations, servers, IoT). The Compliance Framework expects coverage across these scopes—document which identities are interactive and which are non-interactive, and ensure each category has an appropriate MFA or equivalent strong authentication mechanism.

Practical implementation steps — users

For interactive users, adopt a cloud or on-prem Identity Provider (IdP) that supports strong MFA methods and conditional policies. Examples: Azure AD (Microsoft Entra ID), Okta, Duo, Google Workspace. Implementation steps: enable user MFA registration enforcement (Azure: "Require MFA registration"), create Conditional Access policies that require MFA for external access and for administrative roles, and exclude only approved trusted IP ranges. Use strong second factors: FIDO2/WebAuthn hardware tokens (YubiKey, Feitian), platform authenticators (Windows Hello for Business), or authenticator apps (TOTP) as preferred; avoid SMS-based OTP as primary due to SIM swap risks. For local resources (RDP, SSH), integrate MFA via RADIUS/SAML connectors or agents: e.g., Duo NPS extension for Windows RDP/RD Gateway, or PAM/Duo Unix for SSH; for SSH, consider certificate-based authentication with short-lived certs plus optional hardware-backed FIDO2 for interactive logins.

Practical implementation steps — processes and devices

Non-interactive processes should not rely on long-lived static credentials. Replace service-account passwords with certificate-based authentication, OAuth2 client credentials with short-lived tokens (and rotate client secrets frequently), or use cloud-managed identities (Azure Managed Identities, AWS IAM Roles with STS). For device authentication, use device certificates (SCEP/EST) or MDM enrollment to ensure device identity and health attestation; couple device identity with conditional access (e.g., "Require device to be marked as compliant" in Azure Conditional Access). For machine-to-machine connections, prefer mutual TLS (mTLS) or signed JWTs issued by an internal CA/STS and rotate keys automatically using automation (HashiCorp Vault, cloud KMS). For CI/CD, use federated identity (OIDC) so runners get short-lived tokens instead of stored secrets (GitHub Actions OIDC → Azure AD example).

Small business example scenarios

Example A — 25-employee subcontractor using Microsoft 365: enable "Security defaults" or, better, Conditional Access policies in Azure AD requiring MFA for all access outside the office and for admins; issue hardware keys to IT/admins, require authenticator app for general staff, and enroll devices in Intune for device compliance. Example B — small engineering firm with a VPN and an on-prem file server: deploy Duo for VPN and RADIUS integration with the firewall (Palo Alto, FortiGate, or Cisco ASA), enable MFA on the VPN tunnel, and remove direct username/password logins for privileged workstation RDP by placing RD Gateway behind MFA. Example C — software vendor with automated deployments: stop using shared service account passwords; switch to GitHub Actions OIDC with Azure to mint tokens for deployments and use certificate-based auth for on-prem build agents.

Evidence, logging, and documentation for Compliance Framework audits

To demonstrate compliance, collect policy artifacts and operational evidence: screenshots of Conditional Access or IdP policies, MFA enrollment reports, lists of excluded accounts and approved exceptions, logs of authentication events (Azure AD sign-in logs, MFA challenge logs), and config for service-account authentication (certificate issuance records, short-lived token logs). Maintain a written MFA policy detailing accepted factors, break-glass procedures (emergency admin access with documented approvals), exception workflow and risk acceptance, and periodic review schedule. Keep retention and access logs in your SIEM or cloud logging solution and export samples for auditors.

Best practices and compliance tips

Implement phased rollouts (pilot group → department → org), require hardware tokens for privileged roles, enforce device compliance checks before granting access, and remove legacy fallback paths (e.g., VPN split tunneling or unnecessary local admin accounts). Create an MFA onboarding guide and run phishing-resistant training. For backups, store recovery codes securely in a company vault (e.g., enterprise password manager with access controls) and implement an auditable break-glass process. Periodically test your configuration with authentication flow reviews and red-team exercises focused on social engineering and service-account misuse.

In summary, meeting FAR 52.204-21 and CMMC 2.0 IA.L1-B.1.VI for MFA means taking a holistic, documented approach across users, processes, and devices: inventory identities, choose appropriate MFA mechanisms (favor phishing-resistant factors), eliminate long-lived credentials for automation, enforce device compliance, and produce the artifacts auditors need. For small businesses, practical choices like Azure AD Conditional Access, Duo for VPNs, hardware tokens for admins, and short-lived tokens for CI/CD provide a pragmatic path to compliance while significantly reducing real-world compromise risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes