🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to configure role-based access for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II: Practical implementation checklist for contractors

Step-by-step guidance for contractors to implement role-based access (AC.L1-B.1.II) that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 requirements while minimizing risk to CUI.

•
April 12, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives contractors a concrete, Compliance Framework–aligned checklist to design, implement, and evidence role-based access control (RBAC) for FAR 52.204-21 / CMMC 2.0 Level 1 Control AC.L1-B.1.II, including technical commands, small-business scenarios, risks of noncompliance, and practical audit-ready documentation steps.

What AC.L1-B.1.II requires (high level)

At Level 1, AC.L1-B.1.II is about ensuring system access is limited to authorized users and that access is tied to roles/need-to-know — implementing least privilege, documented role definitions, and mechanisms to enforce those definitions across systems that process Federal Contract Information (FCI) or Controlled Unclassified Information (CUI). For small contractors this typically means centralizing identity, using group- or role-based assignments, and maintaining records of approvals and periodic access reviews.

Practical implementation checklist (Compliance Framework)

1) Inventory, classification, and role design

Start by inventorying systems that handle FCI/CUI (email, file shares, collaboration platforms, cloud tenancy, VPN, source control). Create a concise role matrix: map people to roles and roles to privileges (example roles: Employee, Program Manager, Contract Administrator, IT Support, Security Admin). For each role document purpose, required resources, and minimum permissions. Store the matrix in your compliance repository (e.g., Confluence or a secured SharePoint library) and version it for audit traceability.

2) Implement RBAC in your identity provider and systems

Use your primary Identity Provider (IdP) — Azure AD, Okta, Google Workspace — to create role groups and assign users centrally. Prefer group-based assignment over individual ACLs. Example: in Azure AD create a group "CUI-Program-Managers" and assign that group the necessary Azure RBAC roles and SharePoint site permissions. Commands/examples: Azure CLI to create group and assign role: az ad group create --display-name "CUI-Program-Managers" --mail-nickname pm-group; az role assignment create --assignee "" --role "Storage Blob Data Reader" --scope "/subscriptions//resourceGroups//providers/Microsoft.Storage/storageAccounts/". For AWS workloads use IAM roles and groups with least-privilege policies; a minimal S3 read-only policy JSON snippet for a specific bucket: {"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["s3:GetObject","s3:ListBucket"],"Resource":["arn:aws:s3:::acme-cui-bucket","arn:aws:s3:::acme-cui-bucket/*"]}]}. Attach to a group or role rather than users.</p>

3) Onboarding, offboarding, and service account handling

Formalize access request and approval workflows (ticketed approval via Jira/ServiceNow or email + signed request in compliance repo). Automate onboarding where possible (SCIM provisioning) so group memberships are consistent. For offboarding, ensure an immediate disable path and a documented timeline to revoke tokens/SSH keys and VPN/Cloud console access. Treat service accounts specially: store credentials in a secrets manager (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault), rotate every 90 days (or according to contract), and assign service accounts only the minimal privileges needed — no shared human accounts.

4) Monitoring, logging, and periodic reviews

Enable centralized logging: Azure AD Sign-ins, CloudTrail, GCP Cloud Audit, Windows Security Event logs forwarded to your SIEM or cloud log. Configure automated reports for group membership and privileged role changes. Example audit commands: PowerShell export of group membership: Get-AzureADGroupMember -ObjectId | Export-Csv group-members.csv. AWS: aws iam list-groups-for-user --user-name alice. Schedule quarterly access reviews where role owners certify memberships and record their attestations (signed PDF or ticket closure). Keep logs and review evidence for at least contract-required retention period.</p>

Real-world small-business scenario

Acme Defense Solutions (25 staff) example: They centralize identity in Azure AD and use Office 365 for email and SharePoint for document storage; dev/test runs in AWS. They defined four roles (Employee, Program Manager, IT Admin, Contract Admin). Program Managers get SharePoint site owner on specific program sites and S3 read/write to program-specific buckets via an IAM role assumed through Azure AD federation. Acme enforces MFA via Conditional Access for all users, uses Azure AD groups for SharePoint permissions, and requires that any request for temporary elevated access be filed in Jira and approved by the Contract Admin. Evidence for audits is exported group membership CSVs, signed Jira approvals, and CloudTrail logs for role-assumption events.

Compliance tips, best practices, and technical details

Key tips: enforce MFA and use conditional access to block legacy authentication, minimize the number of users with privileged roles, use Privileged Identity Management (Azure AD PIM) or just-in-time elevation for admin tasks, and maintain a separation-of-duties matrix for contract administration. Automate evidence collection: script exports of group membership and role assignments, store them in an immutable archive. Use infrastructure-as-code for cloud RBAC (Terraform azurerm_role_assignment / aws_iam_role_policy) so changes are auditable. For SSH key hygiene use a bastion host and centralized SSH certificate authority to avoid unmanaged keys.

Risk of non-implementation includes unauthorized access to FCI/CUI, data exfiltration, contract penalties or termination, loss of future contracting opportunities, and potential federal reporting obligations. Operational impacts: unmanaged accounts and ad-hoc permissions lead to persistence opportunities for attackers and make incident response slower and forensic evidence harder to compile.

Summary: For Compliance Framework adherence to AC.L1-B.1.II, adopt a simple role matrix, implement group-based RBAC in your IdP and systems, automate onboarding/offboarding, enforce MFA and logging, and maintain quarterly attestations plus scripted evidence exports; small contractors can meet requirements with pragmatic controls (Azure AD groups, AWS IAM roles, secrets manager) and clear, auditable workflows that demonstrate least privilege and approved access.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes