{
  "title": "How to Implement Device and Network Controls to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III: Step-by-Step Guide",
  "date": "2026-04-03",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-implement-device-and-network-controls-to-meet-far-52204-21-cmmc-20-level-1-control-acl1-b1iii-step-by-step-guide.jpg",
  "content": {
    "full_html": "<p>This guide gives small businesses a practical, step-by-step approach to implementing device and network controls required by the Compliance Framework mapping of FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.III so you can protect government-related information, demonstrate compliance evidence, and reduce real-world risks.</p>\n\n<h2>Understanding the requirement and key objectives</h2>\n<p>The Compliance Framework requirement mapped to FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.III focuses on ensuring that devices and network paths that process, store, or transmit covered contractor information are controlled and secured. Key objectives are: maintain an authoritative device inventory, restrict and monitor device access to networks, enforce basic hardening and authentication controls, and document configuration and operational evidence suitable for contract compliance reviews.</p>\n\n<h2>Step-by-step implementation</h2>\n\n<h3>1) Build and maintain an authoritative device inventory</h3>\n<p>Start by discovering all endpoints: desktops, laptops, mobile devices, printers, IoT, and servers. Use an automated inventory tool (MDM, RMM, or an endpoint management product) to collect hostname, MAC address, IP, OS version, installed agents, and last-checkin time. Example: for a 25-person subcontractor, deploy a cloud MDM (Microsoft Intune, JumpCloud, or a lightweight RMM) to enroll corporate laptops and require registration before granting access to contract data. Document the inventory in a spreadsheet or CMDB and export snapshots weekly for audit evidence.</p>\n\n<h3>2) Segment the network and enforce deny-by-default perimeter rules</h3>\n<p>Network segmentation isolates systems that handle covered information from general office devices and guests. Implement VLANs for 'Corp', 'Contractor-CUI', and 'Guest' and enforce inter-VLAN firewall rules on your edge device (UTM or cloud firewall). Example firewall rules: deny all inbound to VLAN 20 (Contractor-CUI) except management from a fixed admin IP; allow outbound only HTTPS (TCP 443) and DNS for required services; block SMB (TCP 445) between VLANs. A small business can achieve this with a managed firewall (e.g., Ubiquiti/UniFi, Meraki, Sophos) and label VLANs in diagrams kept with compliance artifacts.</p>\n\n<h3>3) Harden device baselines and enforce configuration controls</h3>\n<p>Create a baseline configuration for each device class: minimum OS patch level, disk encryption (BitLocker on Windows, FileVault on macOS), firewall enabled, anti-virus/EDR installed and reporting, and disabled unused services. Automate enforcement where possible: use Group Policy or MDM profiles to enforce password complexity, screen lock, and automatic updates. For example, require monthly patching cycles and emergency patching for high-risk vulnerabilities; record patch rollouts and include screenshots or agent logs as proof.</p>\n\n<h3>4) Control network access with authentication and NAC</h3>\n<p>Require authenticated network access using WPA2/WPA3-Enterprise for Wi-Fi and implement 802.1X or a simple NAC solution for wired ports where feasible. For small shops without RADIUS, segregate guest Wi-Fi and use strong PSKs on management networks. Require MFA for remote access (VPN) and admin portals—use certificate-based VPNs or modern client VPNs that verify device posture before granting access. Example posture checks: device enrolled in MDM, disk encryption active, EDR sensor present. Maintain a log of successful/failed authentications for compliance review.</p>\n\n<h3>5) Monitor, log, and maintain evidence for compliance</h3>\n<p>Enable centralized logging for firewall, VPN, and endpoint solutions. Configure logs to capture authentication events, device onboarding/offboarding, and administrative configuration changes. Retain logs long enough to support investigations—90 days is a common practical baseline for small businesses, though contract-specific requirements may vary. Use cloud SIEM-lite tools or even secure log exports (syslog to a separate server) and include a rotation/backup policy and examples of log queries/screenshots as artifacts for auditors.</p>\n\n<h2>Real-world small business scenario</h2>\n<p>Example: A 20-employee engineering subcontractor wins a contract expecting to handle contractor information. They enroll corporate laptops into Intune, enable BitLocker and Defender, create VLAN 10 for CUI servers and VLAN 20 for corporate workstations on a Ubiquiti Dream Machine, and enforce firewall rules that allow outbound HTTPS and block lateral SMB across VLANs. VPN access requires MFA and the VPN gateway checks device posture (Intune compliance) before allowing access. They store network diagrams, device inventory exports, and weekly patch reports in their compliance folder to prove implementation during contract reviews.</p>\n\n<h2>Risks of not implementing these controls</h2>\n<p>Failing to implement device and network controls increases the risk of data exfiltration, ransomware, lateral movement, and unauthorized access to government-related information. Consequences include contract termination, loss of future government work, potential civil penalties, and reputational damage. For small businesses, a single breach can be existential—both operationally and financially—so the controls above are practical mitigations with rapid ROI.</p>\n\n<h2>Compliance tips and best practices</h2>\n<p>Keep your controls simple, documented, and repeatable. Use automated tools to reduce manual error, maintain a change log for network and device configuration changes, and capture screenshots or exported reports as evidence. Prioritize: device inventory and segmentation first, then device hardening and MFA. Periodically test access controls (e.g., attempt to connect an unmanaged device) and run tabletop exercises for breach response. Finally, maintain a compliance checklist tied to each contract so auditors can quickly verify controls and evidence.</p>\n\n<p>Summary: By building an authoritative device inventory, segmenting networks, hardening devices, enforcing authenticated access, and maintaining centralized logs and evidence, a small business can meet the practical expectations of FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III—reducing risk and producing clear artifacts for compliance reviews. Implement these steps incrementally, document everything, and use off-the-shelf management tools to keep ongoing maintenance manageable.</p>",
    "plain_text": "This guide gives small businesses a practical, step-by-step approach to implementing device and network controls required by the Compliance Framework mapping of FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.III so you can protect government-related information, demonstrate compliance evidence, and reduce real-world risks.\n\nUnderstanding the requirement and key objectives\nThe Compliance Framework requirement mapped to FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.III focuses on ensuring that devices and network paths that process, store, or transmit covered contractor information are controlled and secured. Key objectives are: maintain an authoritative device inventory, restrict and monitor device access to networks, enforce basic hardening and authentication controls, and document configuration and operational evidence suitable for contract compliance reviews.\n\nStep-by-step implementation\n\n1) Build and maintain an authoritative device inventory\nStart by discovering all endpoints: desktops, laptops, mobile devices, printers, IoT, and servers. Use an automated inventory tool (MDM, RMM, or an endpoint management product) to collect hostname, MAC address, IP, OS version, installed agents, and last-checkin time. Example: for a 25-person subcontractor, deploy a cloud MDM (Microsoft Intune, JumpCloud, or a lightweight RMM) to enroll corporate laptops and require registration before granting access to contract data. Document the inventory in a spreadsheet or CMDB and export snapshots weekly for audit evidence.\n\n2) Segment the network and enforce deny-by-default perimeter rules\nNetwork segmentation isolates systems that handle covered information from general office devices and guests. Implement VLANs for 'Corp', 'Contractor-CUI', and 'Guest' and enforce inter-VLAN firewall rules on your edge device (UTM or cloud firewall). Example firewall rules: deny all inbound to VLAN 20 (Contractor-CUI) except management from a fixed admin IP; allow outbound only HTTPS (TCP 443) and DNS for required services; block SMB (TCP 445) between VLANs. A small business can achieve this with a managed firewall (e.g., Ubiquiti/UniFi, Meraki, Sophos) and label VLANs in diagrams kept with compliance artifacts.\n\n3) Harden device baselines and enforce configuration controls\nCreate a baseline configuration for each device class: minimum OS patch level, disk encryption (BitLocker on Windows, FileVault on macOS), firewall enabled, anti-virus/EDR installed and reporting, and disabled unused services. Automate enforcement where possible: use Group Policy or MDM profiles to enforce password complexity, screen lock, and automatic updates. For example, require monthly patching cycles and emergency patching for high-risk vulnerabilities; record patch rollouts and include screenshots or agent logs as proof.\n\n4) Control network access with authentication and NAC\nRequire authenticated network access using WPA2/WPA3-Enterprise for Wi-Fi and implement 802.1X or a simple NAC solution for wired ports where feasible. For small shops without RADIUS, segregate guest Wi-Fi and use strong PSKs on management networks. Require MFA for remote access (VPN) and admin portals—use certificate-based VPNs or modern client VPNs that verify device posture before granting access. Example posture checks: device enrolled in MDM, disk encryption active, EDR sensor present. Maintain a log of successful/failed authentications for compliance review.\n\n5) Monitor, log, and maintain evidence for compliance\nEnable centralized logging for firewall, VPN, and endpoint solutions. Configure logs to capture authentication events, device onboarding/offboarding, and administrative configuration changes. Retain logs long enough to support investigations—90 days is a common practical baseline for small businesses, though contract-specific requirements may vary. Use cloud SIEM-lite tools or even secure log exports (syslog to a separate server) and include a rotation/backup policy and examples of log queries/screenshots as artifacts for auditors.\n\nReal-world small business scenario\nExample: A 20-employee engineering subcontractor wins a contract expecting to handle contractor information. They enroll corporate laptops into Intune, enable BitLocker and Defender, create VLAN 10 for CUI servers and VLAN 20 for corporate workstations on a Ubiquiti Dream Machine, and enforce firewall rules that allow outbound HTTPS and block lateral SMB across VLANs. VPN access requires MFA and the VPN gateway checks device posture (Intune compliance) before allowing access. They store network diagrams, device inventory exports, and weekly patch reports in their compliance folder to prove implementation during contract reviews.\n\nRisks of not implementing these controls\nFailing to implement device and network controls increases the risk of data exfiltration, ransomware, lateral movement, and unauthorized access to government-related information. Consequences include contract termination, loss of future government work, potential civil penalties, and reputational damage. For small businesses, a single breach can be existential—both operationally and financially—so the controls above are practical mitigations with rapid ROI.\n\nCompliance tips and best practices\nKeep your controls simple, documented, and repeatable. Use automated tools to reduce manual error, maintain a change log for network and device configuration changes, and capture screenshots or exported reports as evidence. Prioritize: device inventory and segmentation first, then device hardening and MFA. Periodically test access controls (e.g., attempt to connect an unmanaged device) and run tabletop exercises for breach response. Finally, maintain a compliance checklist tied to each contract so auditors can quickly verify controls and evidence.\n\nSummary: By building an authoritative device inventory, segmenting networks, hardening devices, enforcing authenticated access, and maintaining centralized logs and evidence, a small business can meet the practical expectations of FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III—reducing risk and producing clear artifacts for compliance reviews. Implement these steps incrementally, document everything, and use off-the-shelf management tools to keep ongoing maintenance manageable."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance for small businesses to implement device and network controls that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III requirements.",
    "permalink": "/how-to-implement-device-and-network-controls-to-meet-far-52204-21-cmmc-20-level-1-control-acl1-b1iii-step-by-step-guide.json",
    "categories": [],
    "tags": []
  }
}