🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Implement Technical Controls (ACLs, RBAC, MFA) to Restrict Authorized User Functions β€” FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II

Practical, step-by-step guidance for small businesses to implement ACLs, RBAC, and MFA to meet FAR 52.204-21 and CMMC 2.0 Level 1 access-control requirements.

β€’
April 19, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows practical steps for small businesses to implement technical controls β€” access control lists (ACLs), role-based access control (RBAC), and multi-factor authentication (MFA) β€” to restrict authorized user functions in compliance with FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.II).

What the control requires and why it matters

FAR 52.204-21 requires basic safeguarding of covered contractor information systems; CMMC 2.0 Level 1 maps to these FAR requirements and focuses on limiting system functionality to only what authorized users need. Practically, that means enforcing the principle of least privilege, ensuring users cannot perform administrative or data-access actions outside their role, and using technical mechanisms (ACLs, RBAC, MFA) to prevent unauthorized access to Controlled Unclassified Information (CUI) and contractor systems. Failure to implement these controls increases risk of data exposure, contract loss, and mandatory incident reporting.

Start with inventory, roles, and policies

Begin by inventorying systems, data stores (file servers, SharePoint, cloud buckets, databases), applications, network devices, and admin interfaces that handle CUI or contractor data. Create a simple role matrix: map job functions to the minimum set of capabilities needed (read, write, execute, admin). Document each role and the justifications for allowed functions; this documentation is evidence for audits and will guide ACL and RBAC configuration. For small businesses, keep roles coarse but controlled (e.g., ProjectEngineer_ReadOnly, ProjectEngineer_Edit, ProjectAdmin, ITAdmin) to minimize complexity.

Implement ACLs at the resource level (files, folders, network devices)

Apply ACLs to enforce the permissions defined in your role matrix. On Windows file servers, use NTFS ACLs and prefer PowerShell auditability: example to grant a group Modify rights:

icacls "D:\Projects\Contract123" /grant "CORP\ProjEng_Edit:(OI)(CI)M"
For Linux file systems, use POSIX ACLs for per-group permissions:
setfacl -m g:projeng_edit:rwx /srv/projects/contract123
For S3 buckets, restrict access via bucket and IAM policies β€” example minimal policy to allow GetObject for a specific role:
{
  "Version": "2012-10-17",
  "Statement": [{
    "Effect": "Allow",
    "Principal": {"AWS": "arn:aws:iam::123456789012:role/ProjEngRole"},
    "Action": "s3:GetObject",
    "Resource": "arn:aws:s3:::contract123/*"
  }]
}
Network device ACLs (firewalls, routers) should block administrative access from public networks and allow management only from a jump host or specific subnets. Always assign permissions to groups/roles, not individual users, to simplify audits and access reviews.

Deploy RBAC in identity systems and applications

Implement RBAC at the identity provider level (Active Directory, Azure AD, Okta) and in cloud platforms (AWS IAM, Azure RBAC) so roles carry consistent permissions across systems. In Active Directory: create security groups that match your role matrix and use group nesting for hierarchical roles. Example PowerShell to create and add a user to a group:

New-ADGroup -Name "ProjEng_Edit" -GroupScope Global -GroupCategory Security
Add-ADGroupMember -Identity "ProjEng_Edit" -Members "j.smith"
In Azure, use built-in roles where possible and create custom roles for narrow permissions β€” a JSON custom role might allow specific Storage account actions only. In AWS, use IAM roles with least-privilege policies and attach them to EC2 instances or federated users. For third-party apps (Slack, Jira, SharePoint), map application roles to your identity groups and enable SSO to centralize RBAC enforcement.

Require MFA for sensitive access and privileged functions

MFA is a required compensating control for reducing account compromise risk. Enforce MFA for all users who access CUI, VPNs, admin consoles, or cloud management planes. Recommended MFA approaches: platform authenticators (FIDO2 / hardware keys like YubiKey) for administrators, time-based OTP (TOTP) apps (Authenticator, Google Authenticator) for staff, and conditional access for high-risk situations (unfamiliar location or device). Example: in Azure AD, create a Conditional Access policy targeting the "Portal and management" apps and require MFA when accessing from unmanaged devices. For on-prem VPNs, integrate with an IdP or RADIUS server (Duo, Azure MFA Server) and block legacy password-only logins. Avoid SMS where possible due to SIM-swap risks.

Monitoring, access reviews, and evidence collection

Implement logging for ACL and RBAC changes, sign-in events, and MFA challengesβ€”for example, enable CloudTrail for AWS, Azure AD sign-in logs, and Windows Security/PowerShell logs. Retain logs for the period required by contract (commonly 90–365 days) and configure alerts for anomalous privilege escalations or failed MFA attempts. Perform periodic access reviews (quarterly or on contract milestones) and record the review decisions. Maintain a simple change-control log that shows who changed group membership or ACLs and why β€” this becomes critical evidence for FAR and CMMC assessors.

Small business scenario: engineering firm working on a DoD contract

A small 25-person engineering firm handling CUI can meet AC.L1-B.1.II by: (1) defining three roles β€” Viewer (read-only), Contributor (edit project files), and ProjectAdmin (manage project settings); (2) mapping file shares and SharePoint libraries to these roles and setting NTFS or SharePoint permissions to groups rather than individuals; (3) centralizing identity with Azure AD and enforcing group-based RBAC and Conditional Access that requires MFA for SharePoint Online, VPN, and Azure Portal; (4) configuring S3 buckets for backups with IAM roles permitting only automated backup processes to write and designated roles to read; and (5) documenting access reviews quarterly and keeping sign-in/MFA logs for 180 days. This approach is affordable and scalable with built-in Azure/AWS/AD features and a single MFA vendor like Duo or Azure MFA.

Conclusion β€” risks, best practices, and final checklist

Not implementing ACLs, RBAC, and MFA leaves CUI exposed to insider misuse, account takeover, and inadvertent disclosure β€” outcomes that can lead to incident reports under FAR 52.204-21, contractual penalties, and loss of future government work. Best practices: document your role matrix and policies, assign permissions to groups not users, employ MFA for all CUI access and privileged accounts, centralize RBAC in your IdP, automate logging and retention, and perform scheduled access reviews. Quick checklist: inventory resources, define roles, apply ACLs, configure RBAC in your IdP/cloud, enable MFA and conditional access, log and review, and retain evidence. Following these steps gives small businesses an auditable, practical path to meet the control AC.L1-B.1.II while materially reducing their exposure to common threats.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes