🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Multi-Factor Authentication to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI Requirements

Step-by-step guidance for small businesses to implement secure, compliant multi-factor authentication (MFA) that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI requirements.

•
April 16, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-factor authentication (MFA) is one of the most effective technical controls small government contractors can implement to satisfy FAR 52.204-21 and the CMMC 2.0 Level 1 requirement IA.L1-B.1.VI; this post walks through practical, low-cost steps to design, deploy, and document MFA across your environment so you can protect controlled unclassified information (CUI) and stay compliant.

What the Requirement Means for Your Organization

At a high level, FAR 52.204-21 requires basic safeguarding of contractor information systems, and CMMC 2.0 Level 1 control IA.L1-B.1.VI maps to authentication protections such as requiring multi-factor authentication for system access that handles FCI/CUI. Practically, that means you must add a second (or third) authentication factor beyond passwords for accounts that access covered systems—this includes cloud apps (Office 365, Google Workspace), remote access (VPN, RDP), and administrative access to servers and network gear.

Scope and Practical Interpretation for Small Businesses

For a small business, "covered systems" typically include: e-mail and collaboration systems holding federal information, VPN/RDP gateways used by remote staff, privileged admin consoles (AD, firewalls), and any cloud storage with contract data. You should create a minimal scope document that lists systems, users, and the type of access they have; this scope will drive your MFA rollout plan and evidence for audits.

Step-by-Step Implementation Plan

Start with discovery and inventory: export users from your identity store (Azure AD, on-prem AD, Google Workspace) and list all access paths (cloud apps, VPN, SSH). Next, choose MFA technologies aligned with guidance (avoid SMS for primary authentication due to SIM-swap risks; prefer TOTP apps, push-based authenticators, and hardware tokens). For each system, document the integration method (SAML/OAuth SSO, RADIUS, PAM module, or vendor-native MFA) and an implementation timeline.

Example technical actions: for Microsoft 365/Azure AD, enable Conditional Access in Microsoft Entra ID and create a policy: Users and groups = All users (or pilot group), Cloud apps = All cloud apps, Grant = Require multi-factor authentication. For on-prem SSH, install a PAM TOTP module (libpam-google-authenticator) and add "auth required pam_google_authenticator.so" to /etc/pam.d/sshd and enable ChallengeResponseAuthentication in /etc/ssh/sshd_config. For VPN appliances (FortiGate, Palo Alto, Cisco), configure RADIUS authentication to a 2FA provider (Duo, Okta) or use vendor integrations to require MFA for any remote access sessions.

Enrollment, Recovery, and Operational Controls

Plan user enrollment workflows: require initial registration of an authenticator app (e.g., Microsoft Authenticator, Google Authenticator) or provision hardware tokens (YubiKey) for privileged users. Implement a documented recovery process (temporary one-time codes, helpdesk verification steps) and enforce backup codes stored securely (vaulted). Set reasonable "remember MFA on trusted device" windows (e.g., 7–14 days) and log those exceptions; for administrator and remote access accounts, disable persistent remember-me options.

Real-World Small Business Scenario

Consider AcmeGovTech, a 25-employee subcontractor working on a DoD project: They enabled MFA for Microsoft 365 using Azure Conditional Access, required MFA for their Palo Alto GlobalProtect VPN by integrating with Duo via RADIUS, and protected Linux build servers using Duo Unix PAM for SSH. Privileged users received hardware tokens (YubiKey) and all MFA events were forwarded to their SIEM for monitoring. The total monthly cost was modest (authenticator apps free for end users, two hardware tokens procured for admins), and Acme used documented screenshots from the enrollment process for their CMMC self-assessment evidence.

Compliance Tips, Best Practices, and Technical Details

Best practices include: avoid SMS and voice as primary second factors; use TOTP (RFC 6238) with 6-digit codes rotating every 30 seconds or FIDO2/WebAuthn hardware tokens for highest assurance; require MFA for all accounts that can access contract data; integrate MFA enforcement at the identity layer (SSO/IdP) wherever possible so it covers multiple apps. Technical knobs: ensure time synchronization (NTP) on servers for TOTP validation, configure MFA providers to emit logs (successful/failed challenges), and enable geo/risk-based conditional access for high-risk sign-ins.

The risk of not implementing MFA is significant: password-only accounts are high-value targets for phishing and credential stuffing, which can lead to exfiltration of CUI, contract termination, loss of future bids, civil penalties, and reputational damage. Additionally, failing to meet FAR/CMMC requirements may disqualify you from federal contracts and expose you to greater regulatory scrutiny.

Summary: Implementing MFA in a small business to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI is practical and affordable—inventory your systems, choose appropriate MFA methods (prefer TOTP or FIDO2), integrate at the identity layer (SSO/RADIUS/PAM), document policies and exceptions, and maintain logs for audit evidence. With clear scope, a staged rollout, and a recovery plan, you will substantially reduce authentication risk and satisfy compliance expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes