🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Deploy Multi-Factor Authentication for Authorized Users and Systems — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I

Practical, step-by-step guidance on deploying multi-factor authentication to meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I for small businesses and contractors.

April 18, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-factor authentication (MFA) is one of the most effective, cost-efficient controls you can deploy to meet FAR 52.204-21 and the CMMC 2.0 Level 1 control AC.L1-B.1.I requirement to protect access to authorized users and systems; this post gives a practical, small-business-focused implementation plan, real-world examples, and compliance tips so you can deploy MFA with minimal disruption and strong audit evidence.

Understanding the Requirement and Scope

FAR 52.204-21 requires contractors to provide basic safeguarding of contractor information systems and CMMC 2.0 Level 1 maps to basic cyber hygiene practices — which include implementing access controls like MFA for authorized users and systems. For small businesses, interpret this as: apply MFA to all accounts that access government data, business emails, administrative consoles, remote access (VPN/RDP), and any cloud management portals (Azure, AWS, Google Workspace). Document your scope, including user categories (employees, contractors, vendors), system categories (end-user devices, servers, network equipment), and service accounts used by applications.

What counts as acceptable MFA in this context

Acceptable MFA uses two or more distinct authentication factors: something you know (password/PIN), something you have (hardware token, authenticator app, SMS in limited cases), and something you are (biometric). For FAR/CMMC purposes, avoid SMS as a primary factor when stronger options are available — prefer TOTP/Push (authenticator apps), FIDO2/WebAuthn hardware keys (YubiKey, Feitian), and platform authenticators on managed devices. Document the factors you adopt and why they meet the control's intent.

Practical implementation steps (small-business friendly)

1) Inventory and prioritize: start with a simple spreadsheet of users, roles, and systems. Mark anything that touches Controlled Unclassified Information (CUI), admin consoles, or cloud providers as high priority. A 20-person subcontractor might first enforce MFA for: corporate email, the VPN, cloud consoles (AWS/Azure/GCP), and privileged accounts (domain admins, cloud admins), then roll out to all employee accounts.

2) Choose the technology stack: if you use Microsoft 365/Azure AD, enable Azure AD MFA with Conditional Access; if you use Google Workspace, enable 2-Step Verification and enforce security keys via TruePasskeys/WebAuthn. For mixed environments, consider a cloud identity provider (Okta, Ping, JumpCloud) to centralize MFA and SSO. For VPNs and legacy systems that require RADIUS, deploy a RADIUS server (FreeRADIUS or vendor-managed) that validates primary credentials and issues an MFA challenge (OTP or push).

3) Integrate system and service accounts: non-interactive accounts cannot do interactive MFA, so replace long-lived credentials with managed identities, short-lived certificates, or API keys rotated via a secrets manager (HashiCorp Vault, AWS Secrets Manager). For SSH, enforce public-key only access and use SSH certificates or hardware-backed authentication; for Windows Remote Desktop, require MFA at the gateway (RD Gateway) or use conditional access + NPS extension for Azure MFA.

4) Policy, rollout, and evidence: create a simple MFA policy (who, when, exceptions, recovery), configure enforcement (e.g., require MFA for all global admins and remote-access sign-ins; later extend to all users), and pilot with a small group. Capture screenshots of policy settings, enrollment reports, and authentication logs as audit evidence. Maintain a list of approved authenticators and an exceptions register with compensating controls (e.g., physical access, officer-approved exceptions with POA&M entries).

Compliance tips, best practices and monitoring

Train users before enforcement: provide step-by-step enrollment guides (authenticator app setup, security key registration), and publish recovery workflows (backup codes kept in a company vault, helpdesk processes). Disable legacy authentication protocols (IMAP/POP/SMTP BASIC) and enforce modern authentication (OAuth2, SAML, OIDC). Enable authentication logging and integrate with a lightweight SIEM or centralized log store (CloudTrail, Azure AD sign-in logs) and create alerts for suspicious sign-in behavior — repeated MFA failures, new device enrollments, or geo-anomalous sign-ins. Keep an audit trail: enrollment timestamps, admin policy changes, and exception approvals to present during audits.

Real-world examples and scenarios

Example 1 — 12-person subcontractor with Google Workspace: enforce 2-Step Verification for all users, require security keys for contractors with CUI access, configure enforced device management for corporate phones, and use Google’s context-aware access for IP restrictions on sensitive apps. Example 2 — small manufacturer using Azure: enable Azure AD Conditional Access requiring MFA for all external sign-ins and all users in the “CUI-handlers” group; use Microsoft Authenticator push notifications for user convenience and YubiKeys for senior engineers. Example 3 — legacy VPN for field technicians: replace static username/password VPN with RADIUS + MFA; provision technician laptops with client certificates and require certificate + password or push-based MFA at VPN connection time.

Risks of not implementing MFA

Without MFA you face a significantly higher risk of credential compromise leading to unauthorized access, data exfiltration, ransomware, and loss of contracts. For DoD contractors, failure to meet FAR/CMMC requirements can result in contract fines, suspension, or loss of future opportunities. Operationally, a single compromised admin account can lead to widespread lateral movement; MFA reduces the likelihood that a stolen password alone enables that access. Additionally, lack of documentation and evidence of MFA deployment leaves you vulnerable in audits and remediation efforts.

Summary: Deploying MFA to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I is both technically achievable and operationally practical for small businesses: inventory and prioritize systems, choose modern authenticator types (prefer authenticator apps and FIDO2 keys), integrate MFA into identity and VPN systems, handle service accounts with managed identities and short-lived credentials, and collect clear audit evidence. With a phased rollout, training, logging, and documented exceptions, you can meet compliance, materially reduce risk, and keep your contracts secure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes