🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Implement Multi-Factor Authentication to Authenticate Identities for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI: Step-by-Step Deployment Guide

Practical, step-by-step guidance to deploy multi-factor authentication (MFA) that meets FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI requirements for small businesses.

β€’
March 26, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-Factor Authentication (MFA) is a foundational control for meeting FAR 52.204-21 and CMMC 2.0 Level 1 identity requirements β€” this guide shows you, step-by-step, how a small business can plan, deploy, and sustain MFA across on-premises and cloud systems to authenticate identities in a way that is practical, auditable, and defensible for compliance assessments.

Why MFA is required and what Compliance Framework expects

FAR 52.204-21 requires basic safeguarding of contractor information systems and CMMC Level 1 includes controls for authenticating users (IA.L1-B.1.VI). Practically, that means your environment must use more than just passwords to prove a user’s identity before granting access to systems and covered data. The Compliance Framework expectation is demonstrable implementation: documented policies, enforced technical controls, enrollment and recovery procedures, and logged authentication events for review.

Step-by-step deployment guide

1) Prepare: scope, inventory, and policy

Start by scoping: list all systems that store or access Covered Contractor Information (CCI), contractor-controlled unclassified information, or any assets in scope for FAR/CMMC. Inventory accounts (local, AD, cloud), remote access methods (VPN, RDP, SSH), and SaaS apps (Office 365, Salesforce). Create a short MFA policy: who must use MFA (all users, privileged accounts, remote access), acceptable authenticators, enrollment rules, and exceptions process. Document retention and logging requirements and map them to your SIEM or log collection plan.

2) Choose MFA methods and architecture

Pick methods based on risk and feasibility: for small businesses, recommended approaches are (in order of preference) FIDO2/WebAuthn hardware tokens (YubiKey), platform authenticators (Windows Hello/Touch ID), and time-based OTP apps (TOTP via Google Authenticator or Microsoft Authenticator). Avoid SMS-based OTP for high-risk accounts because of SIM swapping. Decide whether to centralize authentication via an IdP (Azure AD, Okta, Google Workspace) for SSO and conditional access, or to integrate MFA per application (less desirable). For infrastructure (SSH, VPN), plan RADIUS or SAML/OIDC integrations with your IdP or use vendor-provided connectors (e.g., Duo for VPN/SSH).

3) Technical integrations and specific configurations

Implementations differ by platform; examples: enable Azure AD "Require MFA" in Conditional Access for all sign-ins to in-scope apps, disable legacy/basic auth in Exchange Online, and require "modern authentication." For Google Workspace, enforce 2-step verification and block less secure app access. For on-prem Active Directory, deploy Azure AD Connect and use Azure AD Conditional Access or deploy a RADIUS server with Duo Authentication Proxy for VPN and network appliances. Secure SSH by requiring certificate-based auth or integrating with a PAM module (libpam-pka, Duo Unix) to require MFA on server logins. For VPN appliances (Cisco ASA, Fortinet, Palo Alto), configure RADIUS to an MFA gateway. Configure enforcement to cover local admin accounts and emergency break-glass accounts β€” protect break-glass with hardware tokens stored securely and logged separately.

4) Pilot deployment and phased rollout

Run a pilot with a representative group (IT, leadership, remote workers) to test enrollment, helpdesk flow, and app compatibility. Track metrics: enrollment rate, failed logins, helpdesk tickets. Use phased enforcement: start by monitoring ("report-only") to discover issues, then enforce MFA for remote access and privileged accounts, then for all user logins. Provide clear user instructions for enrollment, register two authenticators per user (one primary, one backup), and issue hardware tokens to users who cannot use apps. Train helpdesk on verification and recovery procedures that conform to your policy (e.g., out-of-band identity verification before resetting MFA).

Small business examples and real-world scenarios

Example 1: A 25-person engineering firm uses Microsoft 365 and a site-to-site VPN. They deploy Azure AD, enable Conditional Access to require MFA for all cloud app access, integrate Duo for the VPN using RADIUS, and register platform authenticators and TOTP apps for users. Enrollment is done during a two-week window with a dedicated helpdesk hotline. Example 2: A subcontractor with an on-prem AD and SSH-accessible servers installs a PAM-based MFA solution for SSH, issues YubiKeys to executives and admins, and requires authenticator apps for other staff β€” documenting every step for the CMMC assessor.

Monitoring, logging, and maintenance

Logging is essential for compliance: collect authentication events (successful and failed) centrally in a SIEM (Splunk, Elastic, Azure Sentinel). Retain logs per contract requirements and your policy (commonly 1 year or as specified). Monitor for unusual patterns (multiple failed MFA attempts, new authenticator registrations) and configure alerting for high-risk events. Regularly audit enrolled authenticators, revoke lost device credentials immediately, and perform quarterly reviews of exception approvals. Keep software and firmware up to date for IdPs, VPNs, and MFA appliances to reduce vulnerabilities.

Risks of not implementing MFA and common pitfalls

Without MFA, a single compromised password can lead to data exfiltration, unauthorized system changes, loss of CUI, contract penalties, and reputational damage. Common pitfalls include: relying on SMS-only MFA, failing to protect emergency accounts, not covering legacy protocols (POP/IMAP/basic auth), and missing non-user access (service accounts) that must be secured via keys or certificates. Another frequent mistake is inadequate enrollment/recovery processes that either lock out users or allow weak social-engineering recovery.

In summary, implementing MFA to meet FAR 52.204-21 and CMMC 2.0 Level 1 controls is achievable for small businesses with a methodical approach: scope and policy first, choose phishing-resistant authenticators where possible, centralize authentication via an IdP, pilot and phase the rollout, instrument logging and alerting, and maintain documented procedures for enrollment and recovery. Taking these steps not only supports compliance but materially reduces the risk of credential compromise and unauthorized access.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes