🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.VIII: A Step-by-Step Physical Access Controls Checklist for Compliance

A practical, step-by-step checklist for small businesses to implement FAR 52.204-21 and CMMC 2.0 Level 1 physical access control (PE.L1-B.1.VIII) requirements with hands-on examples and documentation tips.

•
March 27, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 control PE.L1-B.1.VIII requires practical, repeatable physical access controls that limit access to contractor information systems and covered information to authorized persons only; this post provides a step-by-step checklist, technical options, small-business examples, and compliance evidence you can implement this week.

Control purpose and key objectives

At its core, PE.L1-B.1.VIII and the FAR basic safeguarding clause aim to prevent unauthorized physical access, damage, and interference to systems that process or store federal contract information (FCI) or controlled technical data. Key objectives are: identify assets that contain or access covered information, implement access controls (locks, badges, escorts), maintain access logs and records, and ensure timely removal of access when personnel change roles or leave.

Step-by-step physical access controls checklist

1) Inventory & classify physical assets

Start by creating an asset register: list rooms, server racks, NAS devices, laptops, printers, removable media storage, and any devices that can access CUI or FCI. Tag each item with an identifier and classify whether it is "sensitive" (stores/processes covered information) or "non-sensitive." For small businesses a simple spreadsheet with columns for location, custodian, classification, and protection level is sufficient.

2) Define policies, roles and least-privilege rules

Write a short physical access policy that maps roles to access rights (e.g., IT admin = server room access, finance = locked file cabinet access). Include requirements for visitor handling, escorting, badge use, key issuance, and termination procedures. Evidence for auditors: the policy document, role-to-access matrix, and signed acknowledgments from staff. Keep policies concise — one or two pages — but specific about who can access what and why.

3) Implement layered physical controls

Use layered controls: perimeter locks, badge readers or smart locks on office doors, key-lock server cabinets, and secured storage for removable media. For small budgets consider cloud-managed access control (AaaS) or smart locks (Zigbee/Z-Wave or Bluetooth) with audit logs. For higher assurance use card readers supporting OSDP (secure channel) or PIV/CAC for federal-grade authentication. Physically secure laptops with cable locks when left on site and keep backups in locked cabinets or encrypted offsite storage. Label and secure wiring closets and install tamper-evident seals on equipment racks.

4) Logging, monitoring and lifecycle operations

Maintain access logs for badge entries, physical key issuance logs, and visitor sign-in sheets. Configure door controllers to forward events to a syslog/SIEM or cloud dashboard; keep logs for a baseline retention (90 days minimum, 1 year recommended for contractual work). Implement a termination checklist: immediately revoke badges, collect keys and tokens, and update access matrices when staff change roles. Test and document quarterly access reviews where managers verify who should retain access.

Small-business real-world example and scenarios

Example: A 20-person contractor with a single office and some remote employees. Practical steps: classify file server and backup NAS as sensitive; install a single cloud-managed door controller and two badge readers (~$1,500 total), lock the server cabinet with a keyed cam lock, encrypt NAS volumes, and implement a visitor binder at reception. For remote workers, require whole-disk encryption, VPN with MFA, and document that no CUI is stored on personal devices. For a mixed environment, maintain a simple "access roster" that lists badge IDs, issue dates, and the approving manager — this is low-cost evidence for compliance assessments.

Compliance tips, technical details and best practices

Technical tips: prefer access solutions that provide tamper-resistant event logs (timestamped, NTP-synced, exportable CSV/JSON). Use credential standards like PIV or smart cards if available; otherwise choose readers with encrypted communications (OSDP over Wiegand). Secure door controllers behind authenticated admin interfaces; use unique admin passwords and 2FA where supported. Best practices include least-privilege assignments, segregation of duties (different people issue badges vs. approve access), periodic access reviews, and a documented POA&M for gaps you cannot immediately remediate.

Risks of not implementing the requirement

Failure to implement these controls exposes your business to data theft, unauthorized access to FCI/CUI, contract suspension or termination, financial penalties, and loss of future government work. Operational risks include insider theft, accidental disclosure when visitors are unescorted, and increased incident scope if physical access allows server tampering or device removal. Non-compliance also complicates audits and can lead to corrective action plans that consume staff time and resources.

Summary: Implementing PE.L1-B.1.VIII and FAR 52.204-21 is achievable for small businesses by inventorying sensitive assets, codifying access policies, deploying layered physical controls, and keeping clear, auditable logs and termination procedures; start with a short policy, a simple asset register and one modest access control device, then iterate toward stronger controls and documented reviews to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes