🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Web and Cloud Settings to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV: Practical Implementation for SMBs

Practical, step-by-step guidance for small and medium businesses to configure web browsers, SaaS, and cloud settings to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 access control requirements.

•
April 16, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

If your small or medium business needs to comply with FAR 52.204-21 / CMMC 2.0 Level 1 (Control AC.L1-B.1.IV), this post gives you hands-on, practical steps to configure web browsers, SaaS applications, and cloud provider settings so authorized users and processes have only the access they need and nothing more.

Understanding the control and Compliance Framework objectives

At Level 1, the Compliance Framework requirement mapped to FAR 52.204-21 focuses on basic safeguarding of Federal Contract Information (FCI). In plain terms: limit access to systems and data to authorized users, devices, and processes. Key objectives include account inventory and management, enforcing authentication and session controls, applying least privilege, and demonstrating configuration decisions via logs and documentation. For SMBs this usually means tightening configuration in web browsers, identity providers, SaaS admin consoles, and cloud consoles (AWS/Azure/GCP).

Implementation steps

Accounts, IAM and least-privilege (practical actions)

Start with an inventory: list all user accounts, service accounts, API keys, and third-party app integrations. Implement role-based access control (RBAC) or groups in your identity provider (e.g., Azure AD, Google Workspace, Okta) and assign permissions by role instead of individual exceptions. For cloud consoles, remove root/owner-level access from everyday use—create an administrative break-glass account stored offline for emergencies. Enforce MFA for all accounts that access FCI or admin consoles. Concrete values: set password policy to at least 12 characters, require rotation for service account keys annually, and set session timeout for console access to 15–60 minutes depending on sensitivity.

Web and browser configuration (practical controls)

Browsers are the front door for web apps—configure them to reduce exposure. Enforce the following via Group Policy, MDM, or browser management consoles: disable storage of credentials in plaintext, block third-party cookies where feasible, enable automatic updates, and use browser extensions only from a whitelisted list. Implement secure cookie attributes (Secure, HttpOnly, SameSite=strict) on your web apps, enable HSTS (Strict-Transport-Security) with a long max-age, and deploy Content-Security-Policy headers to limit cross-site script execution. Example: set session cookies to expire after 20 minutes of inactivity and require reauthentication for admin workflows.

Cloud provider specifics (AWS, Azure, GCP) with examples

Each cloud provider gives controls to enforce least privilege and restrict access. In AWS: enable MFA for the root account, use IAM roles instead of long-lived credentials for EC2/ECS, and enable S3 Block Public Access. Example minimal S3 block settings are enabled from the AWS Console or via the CLI. Turn on CloudTrail with multi-region logging and send logs to an encrypted, write-once S3 bucket for retention. Sample IAM policy (restrictive read-only for a finance role):

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Action": [
        "s3:GetObject",
        "s3:ListBucket"
      ],
      "Resource": [
        "arn:aws:s3:::finance-bucket",
        "arn:aws:s3:::finance-bucket/*"
      ]
    }
  ]
}

In Azure: use Azure AD Conditional Access to require compliant devices and MFA for access to management or SharePoint sites containing FCI. In GCP: use IAM predefined roles and disable legacy roles; set VPC Service Controls to limit data exfiltration. For all providers, turn on provider-level MFA, and remove public exposure of management interfaces (use bastion hosts or VPN + private endpoints).

SaaS, SSO and identity provider hardening

Most SMBs use SaaS (Microsoft 365, Google Workspace, Salesforce). Use SSO to centralize authentication and enforce MFA, device compliance, and contextual policies (location, IP). Configure app-scoped API tokens rather than account-scoped tokens where possible, rotate API keys, and periodically review third-party app access (OAuth consent screens). Example practical steps: in Google Workspace, disable less secure apps, require 2-step verification, and set a 90-day user session length for admin consoles; in Microsoft 365, enable Conditional Access policies that block legacy authentication.

Logging, monitoring, and demonstrating compliance

To meet Compliance Framework audit needs, enable and retain logs showing who accessed what and when. Centralize logs in a simple SIEM or log aggregation (Splunk, Elastic, or native cloud log viewer). Retain at least 90 days of detailed logs (adjust per contract) and export to immutable storage for the period your contract requires. Create a small set of alert rules for suspicious activities: failed logins from new geolocations, privilege changes, creation of new service keys, or removal of MFA. Export and snapshot your configuration pages (e.g., IAM policies, SSO settings) as part of evidence collection for assessments.

Real-world SMB scenario and step-by-step checklist

Scenario: a 25-person subcontractor handling FCI uses Microsoft 365, AWS, and some SaaS CRM. Step-by-step: 1) Inventory accounts and map to roles. 2) Configure Azure AD groups and assign RBAC to Microsoft 365 and AWS via SSO. 3) Turn on MFA for all users and require compliant devices for admin roles via Conditional Access. 4) In AWS, remove console root use, enable MFA, enable CloudTrail + S3 write-once logs, enable S3 Block Public Access, and create least-privilege IAM roles for developers. 5) Harden browsers via Intune/GPO (auto-updates, disable password autofill for shared devices). 6) Document each configuration change and export screenshots/JSON for evidence. This pragmatic sequence gets you to compliance quickly while minimizing business disruption.

Risks of not implementing and compliance tips

Failing to configure these settings risks unauthorized access to FCI, data exfiltration, contract loss, and significant reputational damage. For SMBs, that often translates to losing government contracts or facing remedial action. Compliance tips: prioritize the highest-impact controls first (MFA + least-privilege + logging), automate config checks (use CIS benchmarks and cloud provider configuration scanners like AWS Config/Azure Policy), and keep a simple policy document mapping each control to the actual setting and evidence location. Use change control and scheduled reviews (quarterly) so access does not creep upward over time.

Summary: For SMBs aiming to meet FAR 52.204-21 / CMMC 2.0 Level 1 (AC.L1-B.1.IV), focus on account inventory, RBAC/least-privilege, MFA, browser and cookie hardening, cloud IAM and network posture, SaaS token hygiene, and centralized logging; implement these in small prioritized steps, document every change, and automate continuous checks to maintain compliance without overwhelming your operations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes