🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Implement MFA, Least Privilege, and Device Management for Compliance β€” FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I

Practical, step-by-step guidance to implement MFA, least privilege, and device management to meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.I) requirements for small contractors.

β€’
March 27, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This article gives practical, implementable guidance for meeting FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I by combining multifactor authentication (MFA), least-privilege access controls, and device management β€” focusing on what small government contractors need to do, how to do it, and why it matters.

What this control covers and why it matters

At a high level, FAR 52.204-21 and CMMC 2.0 Level 1 expect contractors to protect Federal Contract Information (FCI) and limit access to systems and devices that process or store that information. AC.L1-B.1.I is an access control practice that requires ensuring only authorized users on authorized devices can access covered systems β€” which is achieved through MFA, strict privilege assignment, and device posture checks. Implementing these controls reduces risk of credential theft, lateral movement, and inadvertent exposure of sensitive data; it also positions small businesses to pass contract audits and avoid contract penalties or loss.

Implementation: MFA β€” practical steps

Start by enforcing MFA for all remote access and for accounts that can access FCI. Practical steps: inventory identity providers (Azure AD, AD FS, Okta, Google Workspace), enable platform native MFA or integrate a third-party provider (Duo, Okta, Yubico). Prefer phishing-resistant methods for privileged users (FIDO2/WebAuthn tokens, hardware OTP) and avoid SMS as a primary factor. For Microsoft environments: enable Azure AD Conditional Access policies to require MFA for risky sign-ins and for sign-ins from legacy auth; set a policy that requires device compliance for MFA (see device management below). For on-premise VPNs and RDP, deploy an MFA gateway or RADIUS integration with your MFA provider. Document the rollout plan: pilot with IT and a business unit, then enforce for all contractor and privileged accounts within 30–90 days.

Implementation: Least privilege β€” practical steps

Least privilege means granting the minimum access needed for a user to perform their role and removing local admin rights wherever possible. Steps: create role-based access definitions (RBAC) for job functions, enforce group membership for access, and automate provisioning via scripts or an identity tool. Use Just-In-Time (JIT) and Just-Enough-Administration (JEA) for elevated tasksβ€”examples: enable Azure AD Privileged Identity Management (PIM) for cloud admin roles, use sudo with time-limited sessions for Linux, and deploy Microsoft LAPS to remove permanent local administrator passwords on Windows endpoints. Conduct quarterly access reviews and revoke unused accounts. For file shares and cloud storage, apply RBAC and ACLs rather than broad "Everyone" permissions. Track changes in a ticketing system so privilege requests have an audit trail for compliance reviews.

Implementation: Device management β€” practical steps

Device management enforces that only compliant, patched, and configured devices connect to your environment. Implement an MDM/EMM solution (Microsoft Intune, JAMF, MobileIron) and define baseline configurations: full-disk encryption (BitLocker/FileVault), screen lock, minimum OS versions, secure boot, EDR agent installed, and disk encryption enforced. Use device enrollment to create a trusted inventory and tag devices that are corporate-owned vs BYOD. Configure Conditional Access to require "device compliant" status for access to cloud resources and VPNs; integrate NAC (network access control) to limit unmanaged devices on the network VLANs. For BYOD, use containerization/app-protection policies to separate corporate data. Finally, establish automated patching, EDR alerts, and periodic configuration drift checks against a secure baseline image to ensure ongoing compliance.

Small business real-world examples and scenarios

Example A β€” 30-person contractor using Microsoft 365: enable Azure AD security defaults or Conditional Access, require MFA for all users, enroll corporate laptops in Intune with a compliance policy that enforces BitLocker and Defender for Endpoint, remove local admin rights via GPO and LAPS, and require MFA for VPN connections. Example B β€” 12-person firm with on-prem AD and a mix of cloud apps: deploy Duo for MFA integration (VPN, RDP, web SSO), use Local Administrator Password Solution (LAPS) and remove admin rights, inventory devices with an asset tag spreadsheet and migrate unmanaged machines off sensitive networks via a separate VLAN enforced by the firewall. These are low-cost, high-impact approaches that small budgets can implement within weeks.

Compliance tips and best practices

Create written policies: an Access Control policy, Device Management policy, and an MFA policy that defines acceptable authentication factors. Maintain an asset inventory and map which devices and accounts handle FCI. Use automation where possible: automate onboarding/offboarding to avoid orphaned accounts, schedule quarterly access reviews, and centralize logs (syslog, cloud audit logs) into a lightweight SIEM or cloud-native logging (e.g., Microsoft Sentinel, Elastic Cloud). Train staff on phishing and MFA enrollment. Keep evidence for audits: policy docs, enrollment screenshots, Conditional Access logs, and access review records β€” label and store these artifacts in a protected location for at least the retention period required by your contract.

Risk of not implementing these controls

Failing to implement MFA, least privilege, and device management increases risk of credential compromise, unauthorized access, ransomware, and exfiltration of FCI. Beyond the immediate operational impact, non-compliance can lead to contract penalties, loss of future contracting opportunities, mandatory incident reporting, and reputational harm. Practically, a single compromised admin account on an unmanaged laptop often leads to lateral movement and domain compromise; adequate controls materially reduce that attack surface.

Summary

To meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.I), prioritize MFA for all sensitive access, enforce least privilege through RBAC and JIT elevation, and use an MDM/NAC combination to ensure only compliant devices connect to your environment. For small businesses, these steps are achievable with a phased plan: inventory identities and devices, pilot MFA and device enrollment, remove local admin rights, and keep records for audits. Implementing these controls reduces risk, simplifies audits, and strengthens your eligibility for government work.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes