{
  "title": "How to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Step-by-Step Guide to Restricting System Access to Authorized Users, Processes, and Devices",
  "date": "2026-04-22",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-implement-far-52204-21-cmmc-20-level-1-control-acl1-b1i-step-by-step-guide-to-restricting-system-access-to-authorized-users-processes-and-devices.jpg",
  "content": {
    "full_html": "<p>This post explains how to meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I—restricting system access to authorized users, processes acting on behalf of authorized users, and authorized devices—by providing a practical, step-by-step implementation plan tailored to small- and medium-sized organizations operating under the Compliance Framework.</p>\n\n<h2>Understanding the requirement and practical objectives</h2>\n<p>At its core this control requires that only authorized identities (people and service accounts), approved processes (applications and services), and managed devices are allowed to access covered contractor information systems and the data they contain. Practical objectives under the Compliance Framework are: maintain a current inventory of users/processes/devices, apply least-privilege access, enforce strong authentication and device attestation, restrict or allowlist processes, and keep auditable records showing who/what/which device accessed systems and when.</p>\n\n<h2>Step-by-step implementation</h2>\n<h3>1) Inventory and define authorized entities</h3>\n<p>Start by creating a baseline inventory: list all user accounts (human and service), approved applications and background processes that require elevated privileges, and all devices that connect to corporate resources. Use tools such as an identity provider (Azure AD, Okta) and an endpoint management solution (Microsoft Intune, Jamf, or a lightweight MDM) to produce exportable inventories (CSV/JSON). Maintain a configuration item (CI) repository that records owner, purpose, access level, and justification for each account, process, and device. For small businesses with limited tooling, a controlled spreadsheet or a simple CMDB (e.g., osTicket or GLPI) paired with periodic manual reviews is acceptable as long as it’s versioned and dated for audit evidence.</p>\n\n<h3>2) Enforce identity and access controls</h3>\n<p>Implement centralized Authentication and Authorization: federate to a cloud IdP (Azure AD, Okta, Google Workspace) to enable single sign-on and centralized account lifecycle management. Enforce multifactor authentication (MFA) for all privileged and remote access accounts. Apply role-based access control (RBAC) and the principle of least privilege when assigning group memberships and file/ACL permissions. Technical examples: use Azure AD Conditional Access policies requiring MFA and compliant device signals for access to SaaS apps; in Active Directory, restrict local administrator membership via Group Policy Preferences and Local Administrator Password Solution (LAPS). Maintain documented procedures for account creation, permission changes, and timely deprovisioning; automate deprovisioning via HR events (termination, role change) integrated with the IdP where possible.</p>\n\n<h3>3) Control and authenticate devices</h3>\n<p>Restrict access to only authorized and compliant devices using network access control (NAC) or cloud conditional access and an MDM. Enforce device enrollment: require device certificates or MDM attestation before granting access (802.1X/EAP-TLS for wired/wifi, or MDM compliance checks in Conditional Access). For small businesses, leverage Intune/Endpoint Manager to require device compliance (disk encryption, patch level, anti-malware) before access; an example Conditional Access policy: require MFA + device compliance for Exchange Online and SharePoint. If BYOD is allowed, use app protection policies and require data containerization. Document device enrollment steps and maintain device lifecycle logs for evidence.</p>\n\n<h3>4) Restrict processes and service accounts (allowlisting and service controls)</h3>\n<p>Limit which processes and services can act on behalf of users by using application allowlisting and strict service account practices. On Windows, implement AppLocker or Windows Defender Application Control (WDAC) to block unauthorized executables and scripts; on Linux, configure file system permissions, use systemd unit restrictions, and control sudoers entries so only required commands are permitted. Manage service accounts by giving them the minimum required privileges, using managed identities where available (Azure Managed Identities), rotating secrets, and avoiding interactive logins. Maintain a catalog of approved processes (binary hash, path, publisher) and record change requests and approvals when new software is introduced.</p>\n\n<h3>5) Monitoring, regular review, and evidence collection</h3>\n<p>Logging and monitoring are essential to demonstrate compliance. Ensure authentication, authorization, device-attestation, and application allowlist events are collected centrally (SIEM, cloud audit logs). For small teams, use built-in cloud logging (Azure AD sign-in logs, Microsoft Defender for Endpoint, Google Workspace reports) and export snapshots monthly for retention. Schedule quarterly access reviews where managers attest to current employee access, and review service accounts and device inventories monthly. Save artifacts for audits: access review outputs, MFA enrollment reports, NAC/Mobile Device enrollment screenshots, AppLocker/WDAC policy exports, and ticketed change approvals.</p>\n\n<h2>Real-world small business scenarios and risk of non-compliance</h2>\n<p>Example scenario A: A 20-person engineering firm uses a mix of personal laptops and corporate devices. Implementing Azure AD with Intune allowed the firm to require device enrollment and block unmanaged devices from accessing project repositories—reducing risk of data leakage when an employee leaves. Example scenario B: A small subcontractor adopted AppLocker to prevent unauthorized tooling from running on design workstations; this blocked a cryptominer that had been introduced via a phishing link. The risk of not implementing these controls includes unauthorized data exfiltration, malware/ransomware spread, insider threat exposure, and contractual breach with the DoD – any of which can lead to loss of contracts, financial penalties, and reputational damage.</p>\n\n<h2>Compliance tips, best practices, and summary</h2>\n<p>Practical tips: document everything (policies, procedures, inventories), automate what you can (provisioning/deprovisioning, compliance checks), prioritize high-impact areas (remote and privileged accounts, vendor access), and keep short evidence retention cycles for audits. Best practices include enforcing MFA, short-lived credentials for service accounts, certificate-based device authentication, process allowlisting, and routine access attestation. Start simple: use cloud IdP and MDM bundles to achieve most requirements cost-effectively, then add NAC and allowlisting as the environment matures. In summary, meeting FAR 52.204-21 and CMMC AC.L1-B.1.I is achievable for small businesses by combining an accurate inventory, centralized identity and device controls, process allowlisting, monitoring, and documented reviews—each supported by preserved evidence to demonstrate compliance during assessments.</p>",
    "plain_text": "This post explains how to meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I—restricting system access to authorized users, processes acting on behalf of authorized users, and authorized devices—by providing a practical, step-by-step implementation plan tailored to small- and medium-sized organizations operating under the Compliance Framework.\n\nUnderstanding the requirement and practical objectives\nAt its core this control requires that only authorized identities (people and service accounts), approved processes (applications and services), and managed devices are allowed to access covered contractor information systems and the data they contain. Practical objectives under the Compliance Framework are: maintain a current inventory of users/processes/devices, apply least-privilege access, enforce strong authentication and device attestation, restrict or allowlist processes, and keep auditable records showing who/what/which device accessed systems and when.\n\nStep-by-step implementation\n1) Inventory and define authorized entities\nStart by creating a baseline inventory: list all user accounts (human and service), approved applications and background processes that require elevated privileges, and all devices that connect to corporate resources. Use tools such as an identity provider (Azure AD, Okta) and an endpoint management solution (Microsoft Intune, Jamf, or a lightweight MDM) to produce exportable inventories (CSV/JSON). Maintain a configuration item (CI) repository that records owner, purpose, access level, and justification for each account, process, and device. For small businesses with limited tooling, a controlled spreadsheet or a simple CMDB (e.g., osTicket or GLPI) paired with periodic manual reviews is acceptable as long as it’s versioned and dated for audit evidence.\n\n2) Enforce identity and access controls\nImplement centralized Authentication and Authorization: federate to a cloud IdP (Azure AD, Okta, Google Workspace) to enable single sign-on and centralized account lifecycle management. Enforce multifactor authentication (MFA) for all privileged and remote access accounts. Apply role-based access control (RBAC) and the principle of least privilege when assigning group memberships and file/ACL permissions. Technical examples: use Azure AD Conditional Access policies requiring MFA and compliant device signals for access to SaaS apps; in Active Directory, restrict local administrator membership via Group Policy Preferences and Local Administrator Password Solution (LAPS). Maintain documented procedures for account creation, permission changes, and timely deprovisioning; automate deprovisioning via HR events (termination, role change) integrated with the IdP where possible.\n\n3) Control and authenticate devices\nRestrict access to only authorized and compliant devices using network access control (NAC) or cloud conditional access and an MDM. Enforce device enrollment: require device certificates or MDM attestation before granting access (802.1X/EAP-TLS for wired/wifi, or MDM compliance checks in Conditional Access). For small businesses, leverage Intune/Endpoint Manager to require device compliance (disk encryption, patch level, anti-malware) before access; an example Conditional Access policy: require MFA + device compliance for Exchange Online and SharePoint. If BYOD is allowed, use app protection policies and require data containerization. Document device enrollment steps and maintain device lifecycle logs for evidence.\n\n4) Restrict processes and service accounts (allowlisting and service controls)\nLimit which processes and services can act on behalf of users by using application allowlisting and strict service account practices. On Windows, implement AppLocker or Windows Defender Application Control (WDAC) to block unauthorized executables and scripts; on Linux, configure file system permissions, use systemd unit restrictions, and control sudoers entries so only required commands are permitted. Manage service accounts by giving them the minimum required privileges, using managed identities where available (Azure Managed Identities), rotating secrets, and avoiding interactive logins. Maintain a catalog of approved processes (binary hash, path, publisher) and record change requests and approvals when new software is introduced.\n\n5) Monitoring, regular review, and evidence collection\nLogging and monitoring are essential to demonstrate compliance. Ensure authentication, authorization, device-attestation, and application allowlist events are collected centrally (SIEM, cloud audit logs). For small teams, use built-in cloud logging (Azure AD sign-in logs, Microsoft Defender for Endpoint, Google Workspace reports) and export snapshots monthly for retention. Schedule quarterly access reviews where managers attest to current employee access, and review service accounts and device inventories monthly. Save artifacts for audits: access review outputs, MFA enrollment reports, NAC/Mobile Device enrollment screenshots, AppLocker/WDAC policy exports, and ticketed change approvals.\n\nReal-world small business scenarios and risk of non-compliance\nExample scenario A: A 20-person engineering firm uses a mix of personal laptops and corporate devices. Implementing Azure AD with Intune allowed the firm to require device enrollment and block unmanaged devices from accessing project repositories—reducing risk of data leakage when an employee leaves. Example scenario B: A small subcontractor adopted AppLocker to prevent unauthorized tooling from running on design workstations; this blocked a cryptominer that had been introduced via a phishing link. The risk of not implementing these controls includes unauthorized data exfiltration, malware/ransomware spread, insider threat exposure, and contractual breach with the DoD – any of which can lead to loss of contracts, financial penalties, and reputational damage.\n\nCompliance tips, best practices, and summary\nPractical tips: document everything (policies, procedures, inventories), automate what you can (provisioning/deprovisioning, compliance checks), prioritize high-impact areas (remote and privileged accounts, vendor access), and keep short evidence retention cycles for audits. Best practices include enforcing MFA, short-lived credentials for service accounts, certificate-based device authentication, process allowlisting, and routine access attestation. Start simple: use cloud IdP and MDM bundles to achieve most requirements cost-effectively, then add NAC and allowlisting as the environment matures. In summary, meeting FAR 52.204-21 and CMMC AC.L1-B.1.I is achievable for small businesses by combining an accurate inventory, centralized identity and device controls, process allowlisting, monitoring, and documented reviews—each supported by preserved evidence to demonstrate compliance during assessments."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance for meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I by restricting system access to authorized users, processes, and devices with real-world examples for small businesses.",
    "permalink": "/how-to-implement-far-52204-21-cmmc-20-level-1-control-acl1-b1i-step-by-step-guide-to-restricting-system-access-to-authorized-users-processes-and-devices.json",
    "categories": [],
    "tags": []
  }
}