🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Step-by-Step Guide to Limiting System Access to Authorized Users and Devices

A practical, step-by-step implementation guide for meeting FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.I by limiting system access to authorized users and devices with actionable controls and small-business examples.

•
April 07, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a hands‑on implementation path for meeting the Compliance Framework requirement in FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I — limiting system access to only authorized users and devices — with clear technical steps, small-business examples, and operational controls you can apply immediately.

Understanding FAR 52.204-21 / CMMC 2.0 Level 1 and AC.L1-B.1.I

At Level 1, CMMC and FAR 52.204-21 require basic safeguarding of Federal Contract Information (FCI) by ensuring only authorized personnel and devices can access systems that handle FCI; AC.L1-B.1.I specifically focuses on controlling access by authenticating users and validating devices. In the context of the Compliance Framework, this means documenting access boundaries, defining authorized roles, and enforcing technical controls (identity, device posture, network segmentation, and account management) so that access is limited and auditable.

Step-by-step implementation guide

1) Inventory users and devices (establish authoritative sources)

Start with an authoritative asset inventory: record every user account, device (workstations, laptops, tablets, phones), server, and IoT device that touches FCI. For small businesses use tools like a simple CMDB (spreadsheet + backups) or free/low-cost tools (GLPI, Snipe-IT, Microsoft Intune inventory). Capture device owner, OS, serial/MAC, assigned user, and last check-in. This inventory is your baseline for access decisions and for demonstrating compliance during assessments.

2) Implement identity and access controls (unique IDs, RBAC, and MFA)

Create unique, auditable user accounts and role-based access control (RBAC). Avoid shared accounts for interactive access; if service/shared accounts are required, track and justify them. Use a cloud identity provider (Microsoft Entra ID/Azure AD, Google Workspace, or Okta) to centralize authentication. Configure strong password policies (recommendation: minimum 12 characters or passphrases) and enable multi-factor authentication (MFA) for all privileged accounts — even though Level 1 may not mandate MFA, it significantly reduces credential compromise risk. Example: create Azure AD groups mapped to application roles, then assign group-based permissions rather than individual permissions to simplify reviews.

3) Enforce device authentication and posture (MDM/NAC/conditional access)

Limit access by device posture: require that devices be known and meet a minimal security baseline before they can access systems with FCI. For small shops, use Microsoft Intune, Jamf (macOS), or Google Endpoint Verification to enroll corporate devices and enforce policies (disk encryption, minimum OS patches, screen lock). Implement conditional access rules (e.g., in Azure AD) that allow access only from devices marked as compliant or enrolled. If you have an on-premise network, deploy a Network Access Control (NAC) solution (Cisco ISE, Aruba ClearPass, or PacketFence) to enforce 802.1X and place unknown devices on a guest VLAN. Practical example: configure Wi‑Fi SSIDs so that "Corp" SSID requires device certificates and EAP-TLS, while "Guest" SSID is isolated from internal subnets.

4) Account lifecycle and operational controls (provisioning, deprovisioning, and least privilege)

Document and automate onboarding/offboarding workflows: tie user provisioning to HR or project starts and require manager approvals. Use SSO + automated provisioning connectors (Azure AD SCIM, Okta provisioning) so that when an employee leaves, their accounts and device access are revoked quickly. Enforce least privilege: users should have only the access necessary for their role. Maintain a review cadence (quarterly or semi‑annually) where managers verify access lists. Practical command/config suggestion: implement scripts or automation that disable accounts immediately upon HR status change and archive logs of the action for compliance evidence.

Monitoring, validation, and the risk of not implementing the control

Logging and regular validation are essential: enable authentication and device check-in logs (Azure AD sign-in logs, Intune compliance reports, NAC access logs) and retain them per your compliance policy. Conduct periodic audits: cross-check inventory vs. directory, verify all devices accessing FCI are enrolled, and review privileged accounts. The risk of not implementing these controls includes unauthorized disclosure of FCI, contract penalties or loss, damage to reputation, and increased likelihood of lateral movement after a breach. For example, an unregistered contractor laptop on the corporate VLAN can access design files and leak FCI — a preventable failure with proper NAC and inventory.

Compliance tips and best practices for small businesses

Practical tips: start with a minimum viable control set — authoritative inventory, unique IDs, MFA, and device enrollment — then iterate. Use cloud-managed services to reduce operational overhead (Azure AD + Intune is a common low-cost path). Maintain clear, simple policies: an Access Control Policy, Device Management Policy, and an On/Offboarding SOP. Train managers on periodic access reviews and ensure HR triggers account changes. For low-budget shops, combine free tiers (Google Workspace, OpenLDAP + FreeRADIUS for 802.1X) or managed MSSP offerings to cover gaps. Always document exceptions and compensating controls; assess risk and record mitigation steps to support compliance reviews.

Summary

Limiting system access to authorized users and devices under FAR 52.204-21 and CMMC 2.0 Level 1 is achievable for small businesses by following a clear sequence: build an inventory, centralize identity, enforce device posture, automate account lifecycle, and monitor access with logs and periodic reviews. Apply least-privilege principles, use MDM/NAC/conditional access to enforce device compliance, and document everything — this practical approach both reduces risk and provides the evidence auditors and contracting officers expect under the Compliance Framework.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes