{
  "title": "How to Document and Evidence Access Controls for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II: What Auditors Look For and How to Prepare",
  "date": "2026-04-14",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-document-and-evidence-access-controls-for-far-52204-21-cmmc-20-level-1-control-acl1-b1ii-what-auditors-look-for-and-how-to-prepare.jpg",
  "content": {
    "full_html": "<p>Meeting FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.II means you must both implement access controls and be able to prove to an auditor that those controls reliably limit system and data access to authorized users and devices; this post shows a pragmatic, evidence-focused approach tailored to small businesses operating under the Compliance Framework so you can prepare artifacts, procedures, and technical evidence that auditors expect.</p>\n\n<h2>What auditors look for</h2>\n<p>Auditors focus less on buzzwords and more on demonstrable artifacts: logical access policies, unique user identities, account provisioning/deprovisioning records, multi-factor authentication (where feasible), role-based or least-privilege assignments, and logs that show who accessed what and when. For FAR/CMMC assessments they will want to see that policies are applied consistently across systems that process Federal Contract Information (FCI) and that access reviews occur at defined intervals. Expect auditors to ask for a combination of policy documents, operational procedures, screenshots or exports from identity systems, and sampling of activity logs with timestamps and user IDs.</p>\n\n<h3>Documentation artifacts auditors accept</h3>\n<p>Prepare these baseline documents: an Access Control Policy (short, signed and versioned), an Account Management SOP (provisioning, deprovisioning, role changes), a Privileged Access Procedure (how admin accounts are granted and monitored), and a Record Retention Statement that describes where access logs and review records are stored and for how long. For evidence, provide ticketing records (Jira, ServiceNow) showing user onboarding/offboarding, role-approval email threads, completed access-review spreadsheets or tools, and training acknowledgment forms that show users were told about access responsibilities.</p>\n\n<h3>Technical evidence and concrete exports</h3>\n<p>Auditors like machine-readable evidence. Examples: CSV exports of IAM user lists and group memberships (Azure AD: \"Get-AzureADUser\" / \"Get-AzureADGroupMember\"; AWS: \"aws iam list-users\" and \"aws iam list-roles\"), conditional access or MFA configuration screenshots, IAM policy JSONs, and signed logs with timestamps from CloudTrail, Azure Activity Logs, or Google Workspace audit logs. If you run endpoints with MDM, export device inventory and enrollment status (Intune, Jamf). Provide sample audit log extracts that map a user to an action (e.g., user alice@company.com downloaded file X on 2026-02-12 15:07:04) and show retention metadata.</p>\n\n<h2>How to prepare — practical steps for small businesses</h2>\n<p>1) Inventory systems that store or transmit FCI; 2) Map owners and default access levels for each system; 3) Define roles minimally (Owner, Approver, Regular User, Service Account) and document role permissions; 4) Implement unique user IDs (no shared logins), enable MFA for all privileged and remote-access accounts, and track service account use via an inventory spreadsheet; 5) Automate provisioning/deprovisioning where possible and tie changes to a ticket with approval workflow. Use built-in platform features (Azure AD groups, Google Workspace organizational units, AWS IAM groups/policies) so configuration can be exported for evidence.</p>\n\n<h3>Small-business scenario: Microsoft 365 + Azure AD</h3>\n<p>Example: a 25-person contractor uses Microsoft 365 and Azure AD. Steps to evidence compliance: enable Azure AD conditional access to require MFA for external access and admin roles, export a CSV of all active users and group memberships (PowerShell: \"Get-AzureADUser -All $true | Export-Csv users.csv\"), produce the Conditional Access policy screenshot and its assignment list, and retain onboarding/offboarding tickets from your PSA (ConnectWise/Autotask) linking the user lifecycle to access changes. For logs, provide Audit Logs from Microsoft Purview or the Azure Activity Log for a sampling period and a short narrative showing how those logs are reviewed monthly.</p>\n\n<h2>Implementation checklist & compliance tips</h2>\n<p>Concrete checklist items: unique user IDs, documented role definitions, RBAC or group-based permissions, MFA enabled for all non-console users, documented provisioning/deprovisioning workflow with tickets, quarterly access reviews with signer’s name and date, exportable IAM/ACL snapshots, and rolling log archives for at least 12 months (or per contract). Best practices: use automation to reduce human error (SCIM provisioning, Identity providers like Okta), restrict admin privileges and use break-glass procedures, rotate service account credentials on a schedule, and keep evidence in a versioned repository (internal SharePoint or Git repo) with limited access so audits are repeatable.</p>\n\n<h2>Risk of not implementing the requirement</h2>\n<p>Insufficient access control documentation increases the risk of unauthorized access to FCI, data exfiltration, contractual noncompliance, loss of current/future DoD contracts, and possible statutory penalties. Practically, poor access control often manifests as orphaned privileged accounts, stale group memberships, and audit gaps — all of which are red flags for auditors and increase attacker dwell time. Failing to produce clear, time-stamped evidence will often lead to corrective actions, delays in contract awards, or failing a CMMC assessment.</p>\n\n<p>In summary, auditors want to see consistent, repeatable proof that access is limited to authorized users and devices: short, applied policies; demonstrable role definitions; ticketed provisioning/deprovisioning; exported IAM configurations; and sample logs and access-review artifacts. For small businesses, prioritize simple automation (SCIM, MFA, group-based access), retain exports and tickets for a year, and prepare a compact evidence bundle (policy, user list export, sample log extract, provisioning tickets, access review sign-off) before the assessor asks — that bundle will materially reduce audit time and risk.</p>",
    "plain_text": "Meeting FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.II means you must both implement access controls and be able to prove to an auditor that those controls reliably limit system and data access to authorized users and devices; this post shows a pragmatic, evidence-focused approach tailored to small businesses operating under the Compliance Framework so you can prepare artifacts, procedures, and technical evidence that auditors expect.\n\nWhat auditors look for\nAuditors focus less on buzzwords and more on demonstrable artifacts: logical access policies, unique user identities, account provisioning/deprovisioning records, multi-factor authentication (where feasible), role-based or least-privilege assignments, and logs that show who accessed what and when. For FAR/CMMC assessments they will want to see that policies are applied consistently across systems that process Federal Contract Information (FCI) and that access reviews occur at defined intervals. Expect auditors to ask for a combination of policy documents, operational procedures, screenshots or exports from identity systems, and sampling of activity logs with timestamps and user IDs.\n\nDocumentation artifacts auditors accept\nPrepare these baseline documents: an Access Control Policy (short, signed and versioned), an Account Management SOP (provisioning, deprovisioning, role changes), a Privileged Access Procedure (how admin accounts are granted and monitored), and a Record Retention Statement that describes where access logs and review records are stored and for how long. For evidence, provide ticketing records (Jira, ServiceNow) showing user onboarding/offboarding, role-approval email threads, completed access-review spreadsheets or tools, and training acknowledgment forms that show users were told about access responsibilities.\n\nTechnical evidence and concrete exports\nAuditors like machine-readable evidence. Examples: CSV exports of IAM user lists and group memberships (Azure AD: \"Get-AzureADUser\" / \"Get-AzureADGroupMember\"; AWS: \"aws iam list-users\" and \"aws iam list-roles\"), conditional access or MFA configuration screenshots, IAM policy JSONs, and signed logs with timestamps from CloudTrail, Azure Activity Logs, or Google Workspace audit logs. If you run endpoints with MDM, export device inventory and enrollment status (Intune, Jamf). Provide sample audit log extracts that map a user to an action (e.g., user alice@company.com downloaded file X on 2026-02-12 15:07:04) and show retention metadata.\n\nHow to prepare — practical steps for small businesses\n1) Inventory systems that store or transmit FCI; 2) Map owners and default access levels for each system; 3) Define roles minimally (Owner, Approver, Regular User, Service Account) and document role permissions; 4) Implement unique user IDs (no shared logins), enable MFA for all privileged and remote-access accounts, and track service account use via an inventory spreadsheet; 5) Automate provisioning/deprovisioning where possible and tie changes to a ticket with approval workflow. Use built-in platform features (Azure AD groups, Google Workspace organizational units, AWS IAM groups/policies) so configuration can be exported for evidence.\n\nSmall-business scenario: Microsoft 365 + Azure AD\nExample: a 25-person contractor uses Microsoft 365 and Azure AD. Steps to evidence compliance: enable Azure AD conditional access to require MFA for external access and admin roles, export a CSV of all active users and group memberships (PowerShell: \"Get-AzureADUser -All $true | Export-Csv users.csv\"), produce the Conditional Access policy screenshot and its assignment list, and retain onboarding/offboarding tickets from your PSA (ConnectWise/Autotask) linking the user lifecycle to access changes. For logs, provide Audit Logs from Microsoft Purview or the Azure Activity Log for a sampling period and a short narrative showing how those logs are reviewed monthly.\n\nImplementation checklist & compliance tips\nConcrete checklist items: unique user IDs, documented role definitions, RBAC or group-based permissions, MFA enabled for all non-console users, documented provisioning/deprovisioning workflow with tickets, quarterly access reviews with signer’s name and date, exportable IAM/ACL snapshots, and rolling log archives for at least 12 months (or per contract). Best practices: use automation to reduce human error (SCIM provisioning, Identity providers like Okta), restrict admin privileges and use break-glass procedures, rotate service account credentials on a schedule, and keep evidence in a versioned repository (internal SharePoint or Git repo) with limited access so audits are repeatable.\n\nRisk of not implementing the requirement\nInsufficient access control documentation increases the risk of unauthorized access to FCI, data exfiltration, contractual noncompliance, loss of current/future DoD contracts, and possible statutory penalties. Practically, poor access control often manifests as orphaned privileged accounts, stale group memberships, and audit gaps — all of which are red flags for auditors and increase attacker dwell time. Failing to produce clear, time-stamped evidence will often lead to corrective actions, delays in contract awards, or failing a CMMC assessment.\n\nIn summary, auditors want to see consistent, repeatable proof that access is limited to authorized users and devices: short, applied policies; demonstrable role definitions; ticketed provisioning/deprovisioning; exported IAM configurations; and sample logs and access-review artifacts. For small businesses, prioritize simple automation (SCIM, MFA, group-based access), retain exports and tickets for a year, and prepare a compact evidence bundle (policy, user list export, sample log extract, provisioning tickets, access review sign-off) before the assessor asks — that bundle will materially reduce audit time and risk."
  },
  "metadata": {
    "description": "Practical guidance for small businesses to document, evidence, and audit-proof access controls required by FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.II), with checklists, artifacts, and real-world examples.",
    "permalink": "/how-to-document-and-evidence-access-controls-for-far-52204-21-cmmc-20-level-1-control-acl1-b1ii-what-auditors-look-for-and-how-to-prepare.json",
    "categories": [],
    "tags": []
  }
}