🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prepare a Compliance Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV (Control 547): Step-by-Step Implementation for Publicly Accessible Information Systems

Practical, step-by-step checklist and technical guidance to help small businesses meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.IV / Control 547) requirements for publicly accessible information systems.

•
April 13, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, actionable checklist to implement FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.IV (Control 547) for publicly accessible information systems, focused on small-business realities and the Compliance Framework requirements for protecting covered contractor information on externally visible sites and services.

Why this control matters and scope under the Compliance Framework

FAR 52.204-21 requires basic safeguarding of contractor information systems; CMMC Level 1 maps those safeguards to a set of basic cyber hygiene controls. For publicly accessible information systems the primary objective (per the Compliance Framework) is to ensure that no Controlled Unclassified Information (CUI) or Covered Defense Information (CDI) is exposed via public-facing assets, and that public systems are hardened, monitored, and logically separated from systems that process CUI. This checklist assumes your organization hosts websites, APIs, or public file shares and needs to demonstrate documented, repeatable controls.

Step-by-step compliance checklist (actionable items)

1) Inventory and classification — identify what is public and what is CUI

Begin by enumerating all publicly accessible assets: websites, web APIs, DNS records, cloud storage buckets, FTP endpoints, and third-party-hosted pages. For each asset record hostname, IP, hosting provider, responsible owner, business purpose, and data classification. Explicitly verify and document that no asset stores or transmits CUI. Evidence: inventory spreadsheet or CMDB export, screenshots of asset lists, and a signed data classification decision for each asset.

2) Network segmentation and hosting controls

Implement segmentation so public workloads are isolated from internal/CUI environments. For cloud-hosted sites, run them in a separate account/project and VPC/subnet with explicit security group rules limiting outbound and inbound traffic. For example, in AWS: place public web servers in a dedicated VPC subnet with a NAT gateway and a limited set of outbound rules; host CUI systems in a separate VPC with no direct routing between them. For small businesses using shared hosting, obtain a written SLA/attestation from the provider confirming logical separation between your public site and any CUI environments. Evidence: network diagrams, cloud account IDs, security group rules, provider attestation.

3) Technical hardening: authentication, encryption, and application protections

Ensure all public-facing web and API endpoints use TLS 1.2+ (prefer 1.3), enforce HSTS, and present valid certificates from a trusted CA (ACME/Let's Encrypt is acceptable if automated and logged). Disable weak ciphers; enable strong cipher suites and Perfect Forward Secrecy. Protect administrative interfaces: restrict by IP or place behind a VPN; require MFA for any administrative console access (e.g., WordPress admin, cloud console). Deploy a Web Application Firewall (WAF) using OWASP rules to block common injection and XSS attempts; enable rate-limiting. For cloud object storage (e.g., AWS S3), block public access at the bucket/account level and use presigned URLs or a CDN with origin access identity for public content. Evidence: TLS scan results (SSLLabs grade), WAF logs or rule snapshots, MFA configuration screenshots, bucket policies, and CDN settings.

4) Patch management, vulnerability scanning, and monitoring

Apply a simple patch cadence: critical OS and application updates within 7 days, other security updates within 30 days. Use automated patching where feasible (unattended-upgrades on Debian/Ubuntu, managed patching in cloud platforms). Run authenticated weekly vulnerability scans (Nessus, Qualys, OpenVAS) and perform monthly CMS/plugin reviews for WordPress/Joomla. Enable centralized logging and retention for access logs and security events (e.g., CloudWatch, ELK, or a SIEM-lite). Configure alerts for suspicious file uploads, repeated authentication failures, or unusual outbound traffic. Evidence: patch reports, vulnerability scan reports, log retention settings, and alerting configurations.

5) Administrative controls, least privilege, and documentation

Enforce least privilege on all accounts tied to public assets. Use role-based accounts with short-lived credentials (AWS IAM roles, Azure Managed Identities) and avoid shared admin passwords. Maintain documented procedures: change control for public content, incident response steps for public asset exposure, and a simple change log showing who modified public-facing content. Keep artifacts for auditors: system hardening checklists, screenshots of IAM policies, and the change control logs. Create a Plan of Action and Milestones (POA&M) for any residual weaknesses.

Real-world small business scenarios and examples

Scenario A — Marketing WordPress site: Host the marketing site in a separate cloud account, enable automatic plugin/theme updates, run weekly vulnerability scans, block access to /wp-admin by IP or require MFA via a single sign-on provider, and ensure S3 media buckets are not public. Scenario B — File sharing for customers: do not use public S3 buckets for customer documents; use presigned URLs with short expiry and enforce server-side encryption (AES-256). Scenario C — Third-party integrations: if you use a SaaS contact form, validate the vendor's security posture and obtain a signed attestation that they do not persist CUI.

Risks of not implementing these controls

Failing to apply these safeguards increases the likelihood of accidental CUI exposure, data leakage via misconfigured storage, web application compromise (defacement, data exfiltration), and lateral movement into internal systems. For contractors, non-compliance can result in contract penalties, removal from procurement lists, reputational harm, and potential regulatory/reporting consequences. Operational risks include downtime, customer trust loss, and remediation costs that often exceed preventive investments.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.IV for publicly accessible information systems is achievable for small businesses by following a documented inventory-classify-segment-harden-monitor approach. Produce simple artifacts (inventory, network diagrams, scan results, configuration screenshots, and POA&M), apply basic technical hardening (TLS, WAF, MFA, patched systems), and maintain clear ownership and procedures—this combination provides defensible evidence of compliance under the Compliance Framework while reducing real operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes