🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Document and Evidence Access Controls for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II: What Auditors Look For and How to Prepare

Practical guidance for small businesses to document, evidence, and audit-proof access controls required by FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.II), with checklists, artifacts, and real-world examples.

β€’
April 14, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.II means you must both implement access controls and be able to prove to an auditor that those controls reliably limit system and data access to authorized users and devices; this post shows a pragmatic, evidence-focused approach tailored to small businesses operating under the Compliance Framework so you can prepare artifacts, procedures, and technical evidence that auditors expect.

What auditors look for

Auditors focus less on buzzwords and more on demonstrable artifacts: logical access policies, unique user identities, account provisioning/deprovisioning records, multi-factor authentication (where feasible), role-based or least-privilege assignments, and logs that show who accessed what and when. For FAR/CMMC assessments they will want to see that policies are applied consistently across systems that process Federal Contract Information (FCI) and that access reviews occur at defined intervals. Expect auditors to ask for a combination of policy documents, operational procedures, screenshots or exports from identity systems, and sampling of activity logs with timestamps and user IDs.

Documentation artifacts auditors accept

Prepare these baseline documents: an Access Control Policy (short, signed and versioned), an Account Management SOP (provisioning, deprovisioning, role changes), a Privileged Access Procedure (how admin accounts are granted and monitored), and a Record Retention Statement that describes where access logs and review records are stored and for how long. For evidence, provide ticketing records (Jira, ServiceNow) showing user onboarding/offboarding, role-approval email threads, completed access-review spreadsheets or tools, and training acknowledgment forms that show users were told about access responsibilities.

Technical evidence and concrete exports

Auditors like machine-readable evidence. Examples: CSV exports of IAM user lists and group memberships (Azure AD: "Get-AzureADUser" / "Get-AzureADGroupMember"; AWS: "aws iam list-users" and "aws iam list-roles"), conditional access or MFA configuration screenshots, IAM policy JSONs, and signed logs with timestamps from CloudTrail, Azure Activity Logs, or Google Workspace audit logs. If you run endpoints with MDM, export device inventory and enrollment status (Intune, Jamf). Provide sample audit log extracts that map a user to an action (e.g., user alice@company.com downloaded file X on 2026-02-12 15:07:04) and show retention metadata.

How to prepare β€” practical steps for small businesses

1) Inventory systems that store or transmit FCI; 2) Map owners and default access levels for each system; 3) Define roles minimally (Owner, Approver, Regular User, Service Account) and document role permissions; 4) Implement unique user IDs (no shared logins), enable MFA for all privileged and remote-access accounts, and track service account use via an inventory spreadsheet; 5) Automate provisioning/deprovisioning where possible and tie changes to a ticket with approval workflow. Use built-in platform features (Azure AD groups, Google Workspace organizational units, AWS IAM groups/policies) so configuration can be exported for evidence.

Small-business scenario: Microsoft 365 + Azure AD

Example: a 25-person contractor uses Microsoft 365 and Azure AD. Steps to evidence compliance: enable Azure AD conditional access to require MFA for external access and admin roles, export a CSV of all active users and group memberships (PowerShell: "Get-AzureADUser -All $true | Export-Csv users.csv"), produce the Conditional Access policy screenshot and its assignment list, and retain onboarding/offboarding tickets from your PSA (ConnectWise/Autotask) linking the user lifecycle to access changes. For logs, provide Audit Logs from Microsoft Purview or the Azure Activity Log for a sampling period and a short narrative showing how those logs are reviewed monthly.

Implementation checklist & compliance tips

Concrete checklist items: unique user IDs, documented role definitions, RBAC or group-based permissions, MFA enabled for all non-console users, documented provisioning/deprovisioning workflow with tickets, quarterly access reviews with signer’s name and date, exportable IAM/ACL snapshots, and rolling log archives for at least 12 months (or per contract). Best practices: use automation to reduce human error (SCIM provisioning, Identity providers like Okta), restrict admin privileges and use break-glass procedures, rotate service account credentials on a schedule, and keep evidence in a versioned repository (internal SharePoint or Git repo) with limited access so audits are repeatable.

Risk of not implementing the requirement

Insufficient access control documentation increases the risk of unauthorized access to FCI, data exfiltration, contractual noncompliance, loss of current/future DoD contracts, and possible statutory penalties. Practically, poor access control often manifests as orphaned privileged accounts, stale group memberships, and audit gaps β€” all of which are red flags for auditors and increase attacker dwell time. Failing to produce clear, time-stamped evidence will often lead to corrective actions, delays in contract awards, or failing a CMMC assessment.

In summary, auditors want to see consistent, repeatable proof that access is limited to authorized users and devices: short, applied policies; demonstrable role definitions; ticketed provisioning/deprovisioning; exported IAM configurations; and sample logs and access-review artifacts. For small businesses, prioritize simple automation (SCIM, MFA, group-based access), retain exports and tickets for a year, and prepare a compact evidence bundle (policy, user list export, sample log extract, provisioning tickets, access review sign-off) before the assessor asks β€” that bundle will materially reduce audit time and risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes