🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Windows, Linux, and Cloud Permissions to Limit User Transactions for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II

Step-by-step guidance to configure Windows, Linux, and cloud permissions to restrict user transactions and meet FAR 52.204-21 / CMMC 2.0 Level 1 requirements using least privilege, logging, and automation.

April 22, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides practical, hands-on guidance for configuring Windows, Linux, and cloud permissions to limit user transactions in order to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 expectations (Control AC.L1-B.1.II equivalent) — focusing on least privilege, actionable controls, logging, and demonstrable evidence for a small business compliance effort.

Why limiting user transactions matters (risk and objectives)

The objective of this requirement is to ensure users can perform only the actions they need and that abnormal or excessive transactions are prevented or detected. For small businesses handling Controlled Unclassified Information (CUI) or contracting with the federal government, failure to limit and monitor user transactions increases risk of accidental disclosure, insider misuse, credential abuse, audit failures, and contract penalties. Practically, you want to implement least-privilege access, limit scope of operations, throttle or block mass operations, and capture logs and evidence for auditors.

Windows: implement least privilege, command control, and transactional limits

On Windows, combine Active Directory group policy, NTFS permissions, AppLocker/JEA, and auditing to constrain what users can do and to log transactions. Practical steps for a small business: create role-based AD groups (e.g., Finance_Read, Finance_DataEntry), assign NTFS permissions with icacls, use AppLocker to block unauthorized executables, and employ Just Enough Administration (JEA) for constrained PowerShell endpoints that let a user run only specific cmdlets.

Examples and snippets:

Grant read-only to a network share for a user group:

icacls "C:\Shares\Financial" /grant "CONTOSO\Finance_Read:(R)" /inheritance:r

Create a JEA endpoint that exposes only the necessary cmdlets (very useful to limit “transactions” like user creation or service restarts):

# minimal example (run on a management server)
New-PSSessionConfigurationFile -VisibleCmdlets 'Get-Service','Restart-Service' -SessionType RestrictedRemoteServer -Path .\FinanceJEA.pssc
Register-PSSessionConfiguration -Name FinanceJEA -Path .\FinanceJEA.pssc

Enable detailed auditing so that read/write/execute operations are tracked (use Audit Policy or Group Policy - Advanced Audit Policy Configuration). For evidence collection, forward Windows Event Logs (Security, Sysmon) to a central collector or cloud SIEM.

Linux: restrict commands, file access, and resource usage

On Linux, practical controls include granular sudoers entries, POSIX ACLs (setfacl), SELinux/AppArmor, PAM rules (faillock), ulimits, and auditd to capture execve and file access. For a small business, create well-defined roles (developers, operators, auditors) and restrict each to the minimal set of commands and directories they must touch.

Example sudoers limiting a user “deploy” to only restart the web service:

echo 'deploy ALL=(root) NOPASSWD: /bin/systemctl restart nginx' | sudo tee /etc/sudoers.d/deploy
sudo chmod 440 /etc/sudoers.d/deploy

Use setfacl to give a specific user read-only or write-only access to a directory without changing group ownership:

setfacl -m u:alice:r-x /srv/data/project
getfacl /srv/data/project

To block brute-force or repeated transactions (e.g., repeated API calls, SSH attempts), configure PAM faillock:

auth required pam_faillock.so preauth silent deny=5 unlock_time=900
auth [default=die] pam_faillock.so authfail deny=5 unlock_time=900

Finally, add auditd rules to log command execution:

-a always,exit -F arch=b64 -S execve -F uid>=1000 -k user-exec

Cloud: IAM least privilege, API throttling, and monitored transactions

Cloud platforms (AWS, Azure, GCP) provide IAM and service controls to limit transactions. Small businesses should adopt role-based IAM, scoped policies, short-lived credentials (IAM roles, Azure Managed Identities), API throttling, and logging (CloudTrail, Azure Activity Log). Two common patterns: 1) restrict API actions to specific resources and 2) enforce rate limits for service endpoints.

Example AWS policy allowing read-only access to a single S3 bucket and denying delete/Put to limit data transactions:

{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "AllowReadSpecificBucket",
      "Effect": "Allow",
      "Action": ["s3:GetObject","s3:ListBucket"],
      "Resource": ["arn:aws:s3:::acme-corp-data","arn:aws:s3:::acme-corp-data/*"]
    },
    {
      "Sid": "DenyWrites",
      "Effect": "Deny",
      "Action": ["s3:PutObject","s3:DeleteObject"],
      "Resource": ["arn:aws:s3:::acme-corp-data/*"]
    }
  ]
}

For APIs exposed to the internet, use API Gateway or CloudFront with WAF rate-based rules to throttle or block abusive transaction patterns. In Azure, use Azure API Management rate limits and Azure AD Conditional Access to require MFA and limit access by IP or device state.

Monitoring, automation, and evidence collection

Limiting transactions is only defensible for compliance if you can show monitoring and response. Centralize logs: Windows Event Forwarding or Syslog to a SIEM, CloudTrail/Azure Monitor logs to long-term storage. Create metric filters for unusual transaction volumes (e.g., spikes in S3 PutObject or in Linux exec calls) and trigger automated actions: disable a compromised IAM principal, remove a user from AD group, or revoke keys.

Example automated response flow for AWS: CloudWatch Logs filter detects >100 PutObject events from a single identity in 5 minutes → CloudWatch Alarm → Lambda runs AssumeRole to disable the IAM user or deactivate the access key and post an incident to Slack/email for human review.

Practical compliance tips and best practices

For small businesses pursuing Compliance Framework objectives: document roles and permissions in a simple spreadsheet, map each role to the minimum allowed transactions, apply policies in code (IaC templates for IAM/GPO/sudoers), rotate credentials and use MFA, schedule quarterly access reviews, and retain logs for the period required by your contract. Use permission boundaries or managed policies for cloud to prevent over-permissive role creation. Keep a change log and screenshots or export policy artifacts to present to auditors.

Conclusion

Limiting user transactions across Windows, Linux, and cloud environments is achievable with a combination of least-privilege permissions, restrictive command controls (JEA/sudoers), resource and rate controls (ulimit, API throttling/WAF), and robust logging plus automation for detection and remediation. For small businesses aiming to meet FAR 52.204-21 / CMMC 2.0 Level 1 (AC.L1-B.1.II-like) expectations, focus on clear role definitions, enforceable technical controls, continuous monitoring, and retained evidence — these are practical, cost-effective steps that materially reduce risk and support audit readiness.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes