🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Publicly Accessible Information Systems for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV: Practical Settings, Tools, and Checklists

Step-by-step practical guidance to configure publicly accessible information systems to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.IV, with settings, tools, and a small-business checklist.

•
April 14, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to configure publicly accessible information systems to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.IV (publicly accessible systems), giving practical settings, cloud and web-server examples, recommended tools, and an actionable checklist tailored to small businesses seeking to demonstrate basic cyber hygiene.

Why AC.L1-B.1.IV matters for small businesses

AC.L1-B.1.IV targets the security posture of systems that are reachable from the internet — web sites, APIs, file shares, management consoles, and other public endpoints — and requires you to ensure those systems do not expose Controlled Unclassified Information (CUI) and that access is appropriately limited or monitored; for a small defense contractor this is often the difference between passing a government solicitation requirement and losing contract eligibility. Publicly accessible systems are high-value targets for automated scanners and opportunistic attackers; basic misconfigurations (open S3 buckets, directory listings, default credentials, or exposed database ports) can lead to data exfiltration and contractual non-compliance under FAR 52.204-21.

Practical configuration settings (high-level)

Start with the principle of least functionality for public endpoints: only expose the services required (typically HTTP/HTTPS) and harden the application and transport layers. Required baseline settings include: enforce TLS 1.2+ and strong cipher suites (disable SSLv3/ TLS 1.0/1.1), enable HSTS with an appropriate max-age, set Content Security Policy, X-Frame-Options, and X-Content-Type-Options headers; disable directory listing and server/version banners; restrict allowed HTTP methods to GET/POST/HEAD where possible; use multi-factor authentication for any administrative console accessible from the internet; and implement logging and centralized log collection of access logs and admin activity for at least the policy-defined retention period.

Cloud-specific controls (AWS, Azure, GCP)

In cloud environments, use native blocking and policy features: AWS - enable S3 Block Public Access, enforce bucket policies denying public ACLs, restrict buckets to the account or CloudFront origin access identity, use Security Groups to allow only necessary ports, deploy an Application Load Balancer with AWS WAF protecting OWASP Top 10 vectors, enable GuardDuty, enable CloudTrail & S3 access logging; Azure - disable anonymous access on Storage Accounts, use Azure Front Door or WAF, apply NSGs to subnets, enable Azure Defender and diagnostic logging; GCP - set buckets to uniform bucket-level access and use IAM conditions, deny public IPs on backend instances, and enable Cloud Armor. Automate enforcement with organization-level SCPs/policies and IaC checks (see tools below).

Web server and application settings

For Apache/Nginx/IIS configure minimal modules, turn off autoindex or directory browsing (Apache: Options -Indexes; Nginx: autoindex off), hide server version strings, remove default pages and sample apps, set secure cookie flags (HttpOnly and Secure), implement rate limiting and WAF rules for login pages, and ensure session handling uses secure cookies and short timeouts. For APIs, implement strict input validation, rate limits, and require API keys/OAuth; avoid using query parameters for sensitive tokens. Use automated TLS provisioning (Let’s Encrypt with Certbot or managed certificates) and monitor certificate expiry to avoid serving insecure endpoints.

Network & access control configurations

Design networks so that management planes and databases are not internet-facing: place databases and internal services on private subnets, expose public services via a hardened reverse proxy or load balancer, and require bastion hosts or VPNs for administrative SSH/RDP with MFA. Security Groups/NSGs should follow deny-by-default (0.0.0.0/0 allowed only for ports that must be public such as 80/443). For SSH, enforce PermitRootLogin no, disable password authentication, use key-based auth with passphrases and restrict SSH access to specific IP ranges or through a jump host; consider using session recording and just-in-time access tools (Azure Bastion, AWS Systems Manager Session Manager).

Tools, automated scans, and continuous checks

Adopt a layered tooling approach: static configuration checks (tfsec, checkov, terraform-compliance) for IaC; automated vulnerability scanning (OpenVAS, Nessus, Qualys) scheduled weekly/monthly for internet-exposed hosts; web-application scans (OWASP ZAP, Burp Suite) on major releases; continuous monitoring (CloudWatch, Azure Monitor, or ELK stack) with alerting for anomalous access patterns; and exploit/attack-surface monitoring services (Shodan searches, Attack Surface Management). Use CI/CD gates to fail deployments with critical findings and integrate SSO/MFA for administrative portals (Okta, Azure AD) to reduce credential risk.

Risk of not implementing AC.L1-B.1.IV

Failure to apply these controls increases the likelihood of data breaches, unauthorized access to CUI, and supply chain compromise. For a small business this can mean contract termination, loss of CMMC eligibility, regulatory penalties, expensive incident response and notification obligations, and long-term reputational damage. Public exposure of backups, test systems, or debug endpoints can provide easy pivot points for attackers who can then move laterally into more sensitive systems.

Actionable checklist for small businesses

Use this compact checklist to operationalize the control: ensure TLS 1.2+ and HSTS on all public endpoints; block public buckets and object storage by default; disable directory listings and server banners; restrict HTTP methods and enable WAF/rate limiting; keep admin consoles off the public internet or behind VPN/MFA; run weekly external vulnerability scans and remediate high findings within a defined SLA; enable and centralize access logs and retain them per policy; enforce least privilege for IAM and security groups; automate IaC policy checks to prevent misconfig from reaching production. Track completion in a simple ticketing board and prepare evidence (configuration screenshots, policy docs, scan reports) for audits.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.IV for publicly accessible systems is achievable for small businesses by applying clear, repeatable hardening steps: minimize exposure, apply strong transport and app-layer protections, lock down cloud storage and network rules, automate scanning and policy enforcement, and document evidence. Implement the practical settings and tools above, follow the checklist, and you’ll reduce risk while producing the artifacts auditors need to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes