🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Step-by-Step Guide to Limiting Information System Access to Authorized Users, Processes, and Devices

Practical, step-by-step guidance to meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1‑B.1.I) by limiting information system access to authorized users, processes, and devices.

March 26, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step approach to implement FAR 52.204-21 and the CMMC 2.0 Level 1 control AC.L1-B.1.I—limiting information system access to authorized users, processes, and devices—targeted at small businesses that must protect Federal Contract Information (FCI) while keeping implementation affordable and auditable.

Overview and Compliance Context

FAR 52.204-21 requires basic safeguarding of contractor information systems, and CMMC 2.0 Level 1 AC.L1-B.1.I specifically requires that access to information systems be limited to authorized users, processes acting on behalf of authorized users, and authorized devices; implementation should be documented, repeatable, and demonstrable to assessors or contracting officers. For a Compliance Framework approach, treat this control as a combination of policy, identity lifecycle, device management, access enforcement, and monitoring/recording for evidence.

Step 1 — Identify and Inventory Users, Processes, and Devices

Begin with a living inventory: a directory of user accounts (employees, contractors, service accounts), a catalog of authorized processes/services (web apps, scheduled jobs, APIs), and an inventory of devices (corporate laptops, mobile devices, IoT/OT equipment). Capture owner, purpose, classification (CUI vs FCI vs public), location, and authentication method. For small businesses, a spreadsheet or lightweight CMDB is acceptable if it includes date-stamped records; include columns for account creation date, last login, associated group membership, and deprovisioning status. This inventory is your primary evidence artifact for auditors and the basis for access decisions.

Practical example — small manufacturing firm

A 25-person shop might track: 20 employee user accounts in Azure AD, 3 service accounts for backups and ERP integrations, 12 Windows laptops managed via Microsoft Intune, 6 operator tablets on a separate OT VLAN, and one on-prem file server. The inventory must show which accounts can access contract-related documents and which devices are allowed on networks carrying that data.

Step 2 — Implement Access Controls for Users

Apply least privilege and role-based access: map job functions to access roles, create AD/IdP groups for those roles, and assign permissions at the group level rather than to individual accounts. Implement account lifecycle controls: automated provisioning/deprovisioning via HR triggers or SCIM where possible, disable or remove accounts within 24–72 hours of departure, and eliminate shared interactive accounts. Where feasible, require multifactor authentication (MFA) for access to cloud services and any system storing contract data—Azure AD Conditional Access or Google Workspace context-aware access are practical solutions. For on-prem Windows, enforce group policy settings such as "Deny log on locally" for sensitive systems and centrally manage local admin rights (use LAPS for local admin password management). Document group membership reports and Conditional Access policies as artifacts.

Step 3 — Limit and Authorize Processes and Service Accounts

Ensure that only approved processes and service accounts can access sensitive resources. Use managed service accounts (gMSA) in Active Directory for Windows services, and create tightly scoped Linux service accounts with no shell and minimal sudo privileges (define explicit sudoers entries, e.g., backupuser ALL=(root) NOPASSWD: /usr/bin/rsync). Implement application allowlisting: AppLocker or Windows Defender Application Control (WDAC) for Windows hosts, and package-signed verification or containerization for Linux. Restrict API keys and service credentials to specific hosts and rotate secrets regularly. Keep a registry of approved service accounts with their assigned capabilities and scheduled review dates for audit evidence.

Step 4 — Control Devices and Network Access

Control which devices may access systems that hold contract data. Use MDM (Microsoft Intune, Jamf, or similar) to enforce device configuration, ensure disk encryption (BitLocker, FileVault), and require device compliance for access. Implement network segmentation: put CUI/FCI services on a separate VLAN and restrict access with ACLs or firewall rules; for wired/wireless access enforcement use Network Access Control (802.1X) or a simpler NAC product and maintain a device certificate inventory. For cloud resources, restrict access to known device identities via conditional access policies that check device compliance. Record device compliance reports, VLAN maps, and firewall rulesets as part of evidence.

Step 5 — Logging, Monitoring, and Collecting Evidence

Enable and centralize logs to demonstrate controls are working: collect authentication logs (Azure AD sign-ins, Windows Event IDs 4624/4634, Linux auth logs), NAC connection logs, MDM compliance reports, and application audit trails. Retain logs for the period required by contract or policy (document your retention policy). Create periodic reports showing account reviews, disabled accounts, and device compliance status. For audits, provide snapshots: group membership exports, Conditional Access policy export, GPO settings, sample event logs showing denied access attempts, and signed policy documents. Where possible, automate evidence collection with scripts or SIEM dashboards to reduce manual effort during assessment.

Compliance Tips and Best Practices

Automate identity lifecycle and deprovisioning (connect HR → Active Directory/IdP), implement principle of least privilege, and establish a quarterly access review process with documented approvals. Use MFA even if not strictly required by Level 1—it's low-cost and high-impact. Avoid relying solely on MAC address filtering; use device certificates or MDM posture checks for stronger assurance. Maintain a single source of truth for user and device inventory, document all policies and exceptions, and implement a change control process so access changes are traceable. Train managers on their role in access reviews and maintain an incident response playbook that includes compromised account handling and evidence preservation.

Risk of Not Implementing This Requirement

Failure to limit access to authorized users, processes, and devices exposes contract data to unauthorized disclosure, ransomware, lateral movement, and supply chain compromise. Non-compliance can lead to contract termination, loss of future government business, possible financial penalties, and reputational damage—small businesses are often targeted because they have weaker controls. Additionally, lack of demonstrable controls can fail a CMMC assessment or FAR compliance review, which directly impacts eligibility for DoD contracts.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I is achievable for small businesses by building a documented inventory, enforcing least privilege and role-based access, controlling service accounts and allowed processes, managing device posture and network segmentation, and centralizing logs and evidence for audits. Start small with strong identity controls and device management, automate deprovisioning and reporting, and maintain routine reviews so your controls remain effective and demonstrable to assessors and contracting officers.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes