🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Deploy Cloud-Based Subnetworks to Isolate Public Services (AWS/Azure) - FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.XI

Practical step-by-step guidance to design and deploy isolated cloud subnets for public services on AWS and Azure to meet FAR 52.204-21 and CMMC 2.0 Level 1 SC.L1-B.1.XI requirements.

March 29, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Isolating public-facing services into dedicated cloud subnetworks is one of the simplest, highest-impact technical measures a small business can take to meet FAR 52.204-21 safeguarding expectations and CMMC 2.0 Level 1 control SC.L1-B.1.XI: it reduces attack surface, enforces network boundaries, and produces evidence for auditors that public traffic is constrained to a controlled perimeter.

Why subnet isolation matters for the Compliance Framework

FAR 52.204-21 requires contractor systems that process or store government-related information to have basic safeguards; CMMC Level 1 requires “basic cyber hygiene” including network protections for public services. Isolating public services into a DMZ-like public subnet (or set of subnets) while keeping application servers and data stores in private subnets addresses both: it demonstrably separates externally routable endpoints from internal systems and limits direct access to sensitive resources. For auditors, evidence includes architecture diagrams, subnet/route table configurations, security group/NSG rules, and flow logs.

Design principles and actionable steps

Key design principles are least privilege, separation of duties, and explicit routes: place load balancers and NAT/egress points in public subnets with tightly scoped security rules, put application servers and databases in private subnets with no public IPs, and route outbound traffic from private subnets through managed NAT or firewall appliances. Document the design in your System Security Plan (SSP) and map each network element to the control (SC.L1-B.1.XI) and relevant FAR clause.

AWS practical implementation (step-by-step)

Typical AWS pattern: create a VPC with at least two availability-zone-aware subnets per layer — public subnets for ALB/Internet Gateway (IGW) and private subnets for EC2/ECS/EKS and databases. Create an Internet Gateway and attach to the VPC. Associate a route table to public subnets with 0.0.0.0/0 -> IGW, and associate a separate private route table for private subnets with 0.0.0.0/0 -> NAT Gateway in public subnet. Use Security Groups to allow inbound port 443 only to the ALB from the Internet, and restrict backend servers to accept traffic only from the ALB/security group. Example AWS CLI snippets: aws ec2 create-vpc --cidr-block 10.0.0.0/16; aws ec2 create-subnet --vpc-id vpc-xxx --cidr-block 10.0.1.0/24 --availability-zone us-east-1a; aws ec2 create-nat-gateway --subnet-id subnet-public --allocation-id eipalloc-xxxx.

Azure practical implementation (step-by-step)

On Azure, create a VNet and define subnets for "Public-DMZ" and "Private-Apps" (and a separate subnet for data if desired). Place Application Gateway or Azure Front Door / WAF in the public subnet; use a Standard Load Balancer with Public IPs only in the public subnet. Configure Network Security Groups (NSGs) on subnets or NICs: allow inbound 443 to the Application Gateway from Internet, deny other inbound to private subnets. Use Azure NAT Gateway for outbound connectivity from private subnets. CLI examples: az network vnet create -g MyRG -n MyVnet --address-prefix 10.1.0.0/16; az network vnet subnet create -g MyRG --vnet-name MyVnet -n PublicSubnet --address-prefix 10.1.1.0/24; az network nsg rule create --resource-group MyRG --nsg-name PrivateNSG --name AllowFromAppGateway --priority 100 --direction Inbound --access Allow --protocol Tcp --source-address-prefixes 10.1.1.0/24 --destination-port-ranges 443.

Small-business scenarios and cost-conscious patterns

Scenario A — A small contractor hosting a public API and an internal admin app: put the API front end behind an Application Load Balancer (ALB) in public subnets, back-end servers in private subnets without public IPs, and a NAT gateway for egress. Use managed RDS/SQL with private-only access and security group rules that permit DB access only from the app subnet. Scenario B — Static website plus admin portal: serve static content via S3 + CloudFront (or Azure Blob + CDN) and reserve public subnets only for a Bastion host or jumpbox if needed. For cost savings, use a single NAT gateway per AZ only when necessary; for very small deployments, use proxy/NAT on a small instance with strict hardening, but document why it meets the control and plan migration to managed NAT when budget allows.

Compliance tips, logging, and evidence collection

To satisfy auditors, maintain crib-sheet evidence: annotated VPC/VNet diagram showing public/private subnets, route tables, IGW/NAT/Firewall positions, security group/NSG rules, and asset inventory with IPs. Enable VPC Flow Logs (AWS) or NSG flow logs (Azure) and forward to CloudWatch Logs / CloudWatch Logs Insights or Azure Monitor/Log Analytics; keep logs for the retention period required by your contract. Enable CloudTrail (AWS) or Azure Activity Log for configuration changes. Regularly export architecture and relevant configuration JSON/YAML (CloudFormation/ARM/Terraform) as immutable evidence of deployed controls.

Risks of not isolating public services

Failure to isolate public services increases the risk of lateral movement, data exposure, and accidental public access to sensitive resources. An attacker who exploits a public service in a shared subnet with backend databases might pivot directly to those databases. Non-compliance can lead to lost contracts, required remediation windows, penalties under FAR provisions, and failing a CMMC assessment. For small businesses, a single misconfiguration (e.g., an RDS instance with a public IP) is a common and high-impact error.

Best practices and final implementation checklist

Checklist: (1) Design separate public and private subnets and document them; (2) Ensure no public IPs on backend servers; (3) Use managed services for NAT and WAF where possible; (4) Harden and minimize bastion/jumpbox use; (5) Implement least-privilege security group/NSG rules and explicit deny as needed; (6) Enable flow logs, CloudTrail/Activity Log, and retain logs per contract; (7) Map all artifacts to the control SC.L1-B.1.XI and FAR 52.204-21 in your SSP and POA&M; (8) Automate deployments with IaC (Terraform/CloudFormation/ARM) so configurations are reproducible and auditable.

Summary: Deploying dedicated public subnets and private application subnets, combined with properly configured route tables, managed NAT/egress, security groups/NSGs, and logging, gives small businesses a clear, auditable implementation that meets FAR 52.204-21 and CMMC 2.0 Level 1 SC.L1-B.1.XI expectations. Start with a simple two-tier VPC/VNet pattern, document everything in your SSP, enable logs, and incrementally harden and automate to reduce risk and produce the evidence auditors need.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes