🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Configure Web Servers and Cloud Storage for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV Compliance: Practical Implementation Steps

Practical, step-by-step guidance to configure web servers and cloud storage to meet FAR 52.204-21 / CMMC 2.0 Level 1 (AC.L1-B.1.IV) basic safeguarding requirements for small businesses.

β€’
April 04, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.IV) means applying basic safeguarding controls to limit unauthorized access to web servers and cloud storage that handle Federal Contract Information (FCI) β€” this post gives actionable, small-business-friendly steps for configuring web servers and managed cloud storage to satisfy the requirement and produce audit evidence.

What this control expects and the key objectives

At Level 1 the goal is basic access control: ensure only authorized users and systems can access information and system functions, protect data in transit and at rest, and generate simple logs/evidence to demonstrate control. Practically that means: enforce strong transport security (HTTPS/TLS), restrict public access to storage endpoints, implement least privilege for administrative and service accounts, enable basic logging, and document configurations for compliance reviews.

Web server configurations you should implement

Transport security and TLS hardening

Always serve sensitive pages over HTTPS and redirect all HTTP to HTTPS. Use modern TLS (minimum TLS 1.2), enable HSTS, and disable legacy ciphers. Example nginx lines: ssl_protocols TLSv1.2 TLSv1.3; and add_header Strict-Transport-Security "max-age=63072000; includeSubDomains; preload";. Test with openssl s_client -connect yoursite.example.com:443 -tls1_2 and run periodic scans (SSL Labs). Use managed certificates (AWS Certificate Manager, Azure App Service certs) or Let's Encrypt with automated renewal to avoid expired certs.

Authentication, admin access control, and server hardening

Enforce MFA for server/console access (cloud provider consoles, SSH jump boxes). Use bastion hosts or VPNs to restrict admin ports; limit SSH to specific IPs with security groups or firewall rules. Apply least privilege: separate service accounts from admin accounts and use role-based access. Harden the server: disable unused modules, remove default pages, set strict file permissions for webroot, and use automatic system package updates or a configuration management tool (Ansible/Chef). For small teams, SFTP and an automated CI pipeline reduce manual credential use.

Cloud storage (S3 / Azure Blob / GCS) practical steps

Block public access, use private buckets/blobs, and control uploads

Prevent accidental public exposure by enabling provider-level block public access: in AWS use aws s3api put-public-access-block --bucket my-bucket --public-access-block-configuration BlockPublicAcls=true,IgnorePublicAcls=true,BlockPublicPolicy=true,RestrictPublicBuckets=true. Use bucket policies to explicitly deny public access and require TLS: a deny statement that rejects requests where aws:SecureTransport is false. For uploads, avoid directly exposing storage; instead use presigned/short-lived URLs or server-side proxy endpoints that validate file type and size and virus-scan content (e.g., Lambda that triggers on S3 PUTs to scan with ClamAV or a managed scanning service).

Encryption and key management

Enable default encryption: SSE-S3 or SSE-KMS for AWS, platform-managed encryption for Azure and GCP. Prefer customer-managed keys (CMKs) in KMS if you need audit control and key rotation. Restrict key usage via IAM/KMS key policies so only specific roles/services can decrypt. Never embed long-lived credentials in codeβ€”use IAM roles for compute services, and rotate any service keys. For presigned URLs keep TTLs short (minutes to hours) and log their creation.

Logging, monitoring and retention for audit evidence

Turn on provider audit logs: AWS CloudTrail + S3 access logs, Azure Activity Logs and storage analytics, or GCP Cloud Audit Logs. Retain logs long enough to meet contract requirements (often 90–365 days) and store them in a write-once location or with restricted access. Configure alerts for public-bucket changes, unusual object reads, or admin console login from new locations. Use inexpensive SIEM/log aggregation (Elastic, Splunk free tier, or cloud-native tools) to centralize evidence for audits.

Small-business real-world scenario

Example: a 12-person defense subcontractor hosts a bid portal and stores attachments containing FCI. Practical setup: host the portal on a managed app service behind a CDN (CloudFront/Azure CDN) with an origin access identity so the storage bucket is private; require staff to authenticate to the portal (MFA-enabled SSO) and use short presigned URLs for uploads; enable SSE-KMS on the bucket, CloudTrail + S3 access logs exported to a separate logging account, and an AWS WAF rule set to block common web attacks. Use automated patching for the app image and an inexpensive vulnerability scan monthly. Document the configuration in a single compliance checklist for the contracting officer.

Compliance tips, best practices and risks of non-compliance

Best practices: maintain an inventory of web and storage endpoints, enforce least privilege, automate evidence collection (CloudTrail, config snapshots), and incorporate change control so configuration drift is visible. Train staff on phishing and credential handling. The risk of not implementing these steps includes inadvertent exposure of FCI (data breach), contract suspension or termination, monetary penalties, and reputational damage β€” even small misconfigurations (public bucket or expired cert) have led to disclosure events and audit failures.

In summary, achieving FAR 52.204-21 / CMMC 2.0 Level 1 (AC.L1-B.1.IV) for web servers and cloud storage is primarily about enforcing HTTPS and modern TLS, blocking public storage endpoints, applying least privilege with IAM and KMS, and producing basic logs and documentation; small businesses can meet these requirements cost-effectively by using managed cloud services, simple automation, and a short compliance checklist to show auditors that controls are implemented and monitored.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes