🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Multi-Factor Authentication to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IA.L2-3.5.2: Step-by-Step Guide for Authenticating Users, Processes, and Devices

Step‑by‑step, vendor-neutral guidance to implement phishing‑resistant multi‑factor authentication and device/process identity controls to satisfy IA.L2-3.5.2 under NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2.

April 09, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a hands‑on, practical roadmap to implement multi‑factor authentication (MFA) and strong identity mechanisms that satisfy NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2 control IA.L2‑3.5.2—authenticating users, processes, and devices—targeted at small businesses that handle Controlled Unclassified Information (CUI).

Why IA.L2‑3.5.2 matters and scoping for small organizations

IA.L2‑3.5.2 requires you to verify the identities of users, processes, and devices before granting access to CUI or entering protected environments—MFA is a key way to demonstrate the required level of assurance. For a small contractor (10–200 employees), scope typically includes: all user accounts that can access CUI (cloud apps, email, file shares), remote access points (VPN, RDP), privileged accounts (administrators, DevOps), and machine/service identities (CI/CD pipelines, servers, IoT endpoints). Document your scope in the System Security Plan (SSP) so auditors can trace policy to implementation and evidence.

Step‑by‑step implementation plan (actionable checklist)

1) Inventory and classify identities: enumerate user accounts, service accounts, and devices that can access CUI. 2) Determine required assurance levels: require phishing‑resistant MFA for privileged users and any administrative actions; standard MFA (TOTP, push) for regular users. 3) Choose technologies: FIDO2/WebAuthn or certificate‑based authentication for phishing resistance; TOTP (RFC 6238) as fallback; OAuth2 client credentials or mutual TLS (mTLS) for service/machine auth. 4) Integrate with identity provider (IdP): configure Conditional Access (Azure AD), Okta, or Duo to enforce MFA for scoped apps and network access (VPN). 5) Secure service and device identities: issue short‑lived device certificates (e.g., 90 days), use TPM/HSM-backed keys, and configure mTLS or signed JWTs for machine‑to‑machine auth. 6) Logging and evidence: centralize MFA events in your SIEM or cloud logs with retention aligned to your SSP. 7) Test, train, and roll out across production with a documented exception/POA&M process.

Technical specifics and examples

Users: Prefer phishing‑resistant methods. Deploy FIDO2/WebAuthn where possible (security keys, platform authenticators). For cloud services, configure SAML/OIDC IdP to require FIDO2 for privileged roles and TOTP for normal users. TOTP parameters: 6 digits, 30‑second timestep (RFC 6238), rate‑limit attempts. Avoid SMS and voice OTP for CUI access due to interception risk. Devices: Use device certificates and mTLS—implement SCEP/EST or an enterprise CA to provision certs, enforce TLS 1.2+ and ECC P‑256 or RSA 3072+ keys, set device cert lifetimes to 90 days and automate renewal. Processes/services: Use OAuth2 client credentials with short‑lived tokens (<1 hour) and rotate client secrets frequently or use mTLS client certs; store keys in an HSM or cloud Key Vault and restrict decryption to the host TPM when possible. SSH: Replace password SSH with signed OpenSSH certificates from an internal CA and require hardware keys for admin logins. VPN/RDP: put MFA at the gateway (VPN appliance or RD Gateway) so credentials never cross unprotected channels.

Real‑world small business scenarios

Scenario A — Small defense contractor (50 employees): The contractor enables Azure AD Conditional Access to require MFA for all Microsoft 365 and file‑share access. Privileged admin accounts are forced to use FIDO2 keys; staff use authenticator apps for day‑to‑day logins. CI/CD pipelines use Azure Key Vault and managed identities with role‑assigned access; build agents authenticate to artifact storage using mTLS and short‑lived certificates. Evidence: screenshots of Conditional Access policies, a list of enrolled FIDO2 keys, PKI issuance logs, and MFA event logs exported for the assessor.

Scenario B — Engineering firm with onsite devices: Devices are issued certificates from an onprem CA using SCEP; IoT measurement devices authenticate to central servers via mTLS. Service accounts for telemetry use client certificates stored in HSM-backed vaults. Remote engineers access CUI repositories through a VPN that enforces MFA with push notifications; admin access requires hardware tokens. Document device provisioning procedures and certificate lifecycles in your SSP and retain provisioning logs for audits.

Compliance tips, controls, and best practices

Map each deployed control to IA.L2‑3.5.2 in your SSP and maintain a test plan and evidence package (policy, screenshots, logs, device cert lists). Apply least‑privilege and role separation—never use admin accounts for mundane work. Implement break‑glass/admin workflow with time‑bounded elevated access and full auditing. Maintain an exceptions/POA&M that documents compensating controls when legacy systems cannot support modern MFA. Use continuous monitoring: alert on failed MFA flood, credential stuffing patterns, or unexpected token issuance. Keep configuration as code for IdP policies so changes are auditable.

Risks of non‑implementation

Without proper MFA and machine identity controls you expose CUI to credential theft, phishing, lateral movement, and supply‑chain compromise. Small businesses are particularly attractive targets because single compromised credentials can expose the whole environment. Beyond technical risk, failure to implement IA.L2‑3.5.2 risks non‑compliance findings, contract penalties, lost government business, and reputational damage. An attacker using a compromised admin account can disable logging, exfiltrate CUI, and obscure traces—costs that far exceed the implementation effort.

Implementing MFA and strong device/process identity controls is achievable for small organizations: start with an inventory, prioritize phishing‑resistant methods for privileged access, use certificates/mTLS for devices and services, centralize logs for audit, and document everything in the SSP and POA&M. These steps both harden your environment and produce the artifacts auditors look for under NIST SP 800‑171 Rev.2 / CMMC 2.0 Level 2 IA.L2‑3.5.2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes