🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Multi-Factor Authentication to Enforce FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I for Authorized Users and Processes

Practical, step-by-step guidance for small businesses to deploy multi-factor authentication that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I for authorized users and processes.

•
April 09, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-factor authentication (MFA) is one of the most effective controls for protecting covered contractor information and meeting both FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.I) requirements; this post gives a practical, small-business-focused roadmap to implement MFA for authorized users and secure non-interactive processes where MFA is not feasible.

What the requirement means in practice

Under the Compliance Framework, FAR 52.204-21 requires basic safeguarding of contractor information systems that process federal information, and CMMC 2.0 Level 1 control AC.L1-B.1.I specifically targets authentication for authorized users and processes. In practical terms this means: require a second factor for interactive human access to accounts (especially remote and privileged accounts), and ensure non-interactive processes (service accounts, automation) use strong cryptographic authentication and short-lived credentials when MFA cannot be applied.

Implementation roadmap — steps for a small business

1) Inventory: catalog all user accounts, privileged roles, remote access points (VPN, RDP), cloud identities, and machine/service accounts. 2) Risk-tier users: identify privileged admins, contractors, and users with access to Controlled Unclassified Information (CUI) for immediate enforcement. 3) Select MFA technologies: prefer phishing-resistant factors (FIDO2/hardware keys, platform authenticators, certificate-based) and avoid SMS/voice where possible. 4) Pilot: enable MFA for a small user group, verify workflows, update support processes. 5) Rollout and enforcement: enforce via identity provider conditional access, VPN/RADIUS integration, or OS-level policy. 6) Document exceptions and compensating controls for non-interactive processes.

Technical choices and integration details

Choose an identity provider that supports strong conditional access (Azure AD, Okta, Google Workspace, Duo, JumpCloud). For cloud environments: enforce MFA with Conditional Access (Azure AD) or Sign-On Policies (Okta). For on-prem or VPN: integrate your VPN with an MFA gateway using RADIUS or SAML. For legacy systems that cannot integrate directly, place them behind a jump host or bastion that requires MFA.

Applying MFA to authorized users: concrete examples

Example A — Azure AD: Create a Conditional Access policy targeting all users and cloud apps, require "Grant — Require multi-factor authentication", set exclusions only for managed service accounts. Use named locations and device state to reduce friction for trusted corporate devices. Example B — Okta: Configure a Sign-On Policy that requires 2-step verification for any login originating from untrusted networks and make 2FA required for the "CUI Access" group. Example C — Google Workspace: Enforce 2-Step Verification, whitelist FIDO security keys for high-risk accounts.

Handling non-interactive processes and service accounts

Many processes cannot perform interactive MFA; the Compliance Framework allows strong alternatives. Replace long-lived static credentials with one or more of the following: managed identities (Azure Managed Identity, AWS Instance Profile), mutual TLS / client certificates, OAuth 2.0 client_credentials with private_key_jwt, or short-lived tokens obtained from a secure token service. For AWS, prefer IAM roles for EC2/ECS with short-lived credentials and avoid embedding keys. If a process must use credentials, store them in a secrets manager and enforce automatic rotation and strict access controls.

Example AWS policy to require MFA for specific actions

For user-level enforcement in AWS, you can require MFA for console or API actions using the aws:MultiFactorAuthPresent condition. Example snippet to deny an action unless MFA is present (attach to IAM user or role conditions):

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Deny",
      "Action": "ec2:TerminateInstances",
      "Resource": "*",
      "Condition": { "Bool": { "aws:MultiFactorAuthPresent": "false" } }
    }
  ]
}

Compliance tips, best practices, and monitoring

Prefer phishing-resistant MFA (hardware tokens, WebAuthn/FIDO2) for privileged accounts. Disable SMS/voice as a primary factor if possible. Maintain an emergency "break glass" account with strict controls and audited use. Log all authentication events centrally (SIEM) and monitor for compromised factor signals (failed MFA attempts, suspicious geolocation). Keep an MFA enrollment and recovery process documented and supported — lost second-factor is one of the most common user friction points.

Risks of not implementing MFA or doing it poorly

Without effective MFA, small businesses face higher risk of credential compromise, lateral movement, and exfiltration of CUI. Consequences include contract violations, loss of federal business, possible suspension from contracting, reputational damage, and financial loss from breach remediation. Poor implementations (e.g., allowing SMS, failing to protect service accounts) leave critical gaps that attackers frequently exploit.

Verification, audit evidence, and sustaining compliance

To demonstrate compliance under the Compliance Framework, retain: inventory and risk-tier documentation, identity provider policies (Conditional Access/Sign-On policies), logs of MFA events, exception records with compensating controls, and evidence of training and user enrollment. Periodically test MFA by conducting simulated phishing and access reviews, and include MFA enforcement in your annual compliance assessment.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I requires a pragmatic mix of enforced MFA for human users and strong cryptographic authentication for processes; small businesses should inventory identities, choose phishing-resistant factors, integrate MFA into identity and access flows (cloud, VPN, bastions), protect service accounts with managed identities or short-lived tokens, and maintain logging and documented exceptions to sustain compliance and reduce breach risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes