🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet AC.L2-3.1.2

Practical guide for SMBs to implement AC.L2-3.1.2 using Microsoft 365 tools and security controls

•
September 08, 2025
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

AC.L2-3.1.2 – Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

This control comes from NIST SP 800-171 REV.2 / CMMC 2.0 Level 2.

Understanding the Requirement

This control requires you to define what each role in your organization is allowed to do and then enforce those limits in your systems. Users should only access the information and functions needed for their job (for example, specific SharePoint sites or applications), and administrative privileges must be restricted to a small set of authorized personnel. In practice, you document allowed transactions/functions by role, implement those permissions using security groups and role assignments, and periodically verify that access matches job duties.

Policies and Procedures Needed

Establish role-based access control (RBAC) in policy, with procedures for onboarding/offboarding, group-based access assignment, and approval workflows. Include device authorization (who can access from what devices), privileged access management, and governance for service accounts and guest users. Define how often access reviews occur, who performs them, and how exceptions are requested, approved, and documented. Require removal of excess access when roles change and formalize incident response if unauthorized access is detected.

Technical Implementation in Microsoft 365

  • Model roles with groups in Entra ID (Azure AD): Create role-based security groups (e.g., HR, Finance, Developers). Use dynamic groups (department/jobTitle attributes) where possible to automate membership. Assign these groups to Microsoft 365 resources (SharePoint sites, Teams, Planner, Applications) and app roles so users inherit only the permissions required.
  • Enforce least privilege for admins with Entra ID Privileged Identity Management (PIM): Limit administrative roles to the minimum set (e.g., SharePoint Admin vs. Global Admin). Require just-in-time elevation, MFA on activation, approval workflows, and time-bound sessions. Use PIM access reviews to routinely re-certify admin role eligibility and remove unused privileges.
  • Control application access with Entra ID enterprise app assignments: Assign users/groups to specific SaaS and line-of-business apps and app roles. Disable user consent to apps; route consent through admins. Use Conditional Access to require MFA and compliant devices for sensitive apps and to block legacy authentication.
  • Gate access by device posture with Intune and Conditional Access: Configure Intune device compliance policies (encryption, OS version, password, Defender). Create Conditional Access policies that allow access to Microsoft 365 only from compliant or app-protected devices, require MFA for riskier scenarios, and block from unsupported locations. Apply stricter policies to privileged roles.
  • Secure data paths by scoping resource permissions: Use SharePoint site-level permissions mapped to your Entra ID groups; avoid giving users direct permissions. Lock down sensitive sites (e.g., HR, Payroll) to dedicated groups and use private Teams where appropriate. For mailbox and calendar permissions, grant access via groups and audited admin roles only.
  • Review and monitor access with Access Reviews, Audit Logs, and Identity Protection: Schedule recurring Access Reviews for key groups, apps, and privileged roles; require resource owners to attest. Monitor Entra ID Audit Logs and Microsoft 365 unified audit logs for group changes, role assignments, and site permission modifications; set alerts. Enable Identity Protection to detect risky sign-ins and users; auto-remediate with MFA challenges or access blocking.

Example in a Small or Medium Business

Contoso Health (120 employees) defines roles for HR, Clinical, Finance, and Engineering and creates matching groups in Entra ID. When two new hires start—one in HR and one as a developer—HR triggers an onboarding workflow that assigns each person to the correct Entra ID group based on department, which automatically grants access to the HR or Engineering SharePoint sites and Teams. The HR group has access to the HR site and an HR application registered in Entra ID; the Engineering group has access to Dev tools but no HR resources. Conditional Access requires MFA for both users and only permits access from Intune-compliant devices; the developer’s personal device is blocked until enrolled and compliant. Admin roles are limited via PIM, so the IT lead activates SharePoint Admin just-in-time when needed, with approval and a 2-hour time limit. Monthly Access Reviews prompt the HR manager and Engineering lead to confirm their group memberships; when the developer transitions to a new project, the lead removes access directly in the review. Audit Logs show all permission changes, and Identity Protection flags a risky sign-in attempt to the HR app from an unfamiliar location, which Conditional Access blocks pending MFA.

Summary

Meeting AC.L2-3.1.2 means defining allowable transactions and functions by role and enforcing them with Microsoft 365’s identity, device, and resource controls. Entra ID groups and app assignments deliver least-privilege access; PIM restricts and governs admin rights; Intune and Conditional Access ensure only trusted, compliant devices and authenticated users connect; and Access Reviews, Audit Logs, and Identity Protection provide continuous validation and monitoring. Together, these policy and technical measures ensure users can perform their jobs while access to other systems and functions remains appropriately limited.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes