🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prepare for an Audit: Demonstrating Compliance with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III by Verifying and Limiting External Information Systems

Practical steps for small businesses to verify and limit external information systems to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III, including technical controls, documentation, and audit evidence.

•
April 15, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Preparing for an audit against FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.III requires demonstrable processes and technical controls that verify and limit the use of external information systems—this post gives a practical, small-business-focused roadmap for implementing those controls, collecting evidence, and reducing risk.

What AC.L1-B.1.III and FAR 52.204-21 Expect

At a high level, AC.L1-B.1.III expects organizations to verify external information systems before allowing them to process, store, or transmit controlled unclassified information (CUI) or Federal contract information (FCI), and to limit unapproved external systems from interacting with organizational assets. FAR 52.204-21 has similar expectations for safeguarding covered contractor information systems—implementation should show reasonable safeguards and documented decisions about external hosts, cloud services, and third-party tools.

Practical Implementation Steps (Compliance Framework / Practice)

Start with scoping and inventory: identify every external information system (cloud storage, SaaS collaboration tools, third-party vendor portals, contractor-managed servers) that touches FCI/CUI or connects to your internal network. Create a simple spreadsheet or CMDB that lists system name, vendor, purpose, classification of data handled, contract references, and current status (approved/pending/blocked).

Verification checklist

Verify each external system before approval using a concise vendor checklist: does the vendor support TLS 1.2+, do they provide role-based access control, do they have documented incident response, do they accept contractual flow-downs for FAR/CMMC requirements, and do they have evidence such as SOC 2 Type II or ISO 27001? Log the verification date, evidence ID (e.g., "SOC2-2025.pdf"), and approver name.

Limiting and enforcing access

Limit external systems via a combination of policy and technology: deny-by-default allowlists for outbound connections (DNS and IP/FQDN), web proxy/CASB policies that enforce sanctioned SaaS only, NGFW rules restricting egress ports and protocols, separate VLANs or zero-trust micro-segmentation for systems that interact with external systems, and company-managed device requirements (MDM enrollment, disk encryption). Example technical enforcement: create an explicit egress firewall rule that allows only HTTPS to a list of FQDNs for approved SaaS vendors, and block all other outbound web traffic at the perimeter/proxy.

Technical Details and Config Examples

Small businesses can implement effective controls without expensive engineering resources. Examples: (1) Use a cloud web-proxy/CASB (e.g., Umbrella, Zscaler, or a hosted proxy) with an allowlist—configure to only permit approved vendor FQDNs; (2) On AWS, use VPC endpoints and Security Groups to prevent resources from accessing the public internet except through controlled NAT/proxy; example Security Group snippet: allow outbound 443 to vendor IP range X.X.X.0/24 and deny others using explicit deny in the NGFW. (3) On endpoints, enforce conditional access (Azure AD CA) to require managed device + MFA for access to business SaaS, blocking unmanaged personal accounts.)

Real-world Small Business Scenario

Scenario: A 25-person engineering firm must allow contractors to upload design files to a cloud repository. Implementation: the firm selects one sanctioned vendor (enterprise Box), updates the vendor questionnaire, obtains a SOC 2 report, configures an organization-only enterprise account (no consumer Box links allowed), restricts access to company-managed devices via Conditional Access, and applies DLP rules to prevent sharing of folders with external consumer domains. Evidence for the auditor: vendor contract, SOC 2 report, Conditional Access policy screenshot, DLP rule configuration, and the CMDB entry showing the approval with date and approver.

Audit Evidence and Documentation to Collect

Auditors want to see repeatable processes and artifacts. Prepare: (a) external systems inventory with classification and approval status; (b) vendor verification artifacts (questionnaire, third-party attestations, contracts with flow-down clauses for FCI/CUI); (c) configuration screenshots or exports (firewall allowlist, proxy allowlist, Azure AD Conditional Access policy, MDM enrollment report); (d) logs showing denied connections to unapproved systems and allowed connections to approved systems (timestamped egress logs, proxy logs); (e) policies (Acceptable Use, Third-Party Risk Management, Remote Access) and training records that reference these controls.

Compliance Tips, Best Practices, and Risks of Non-Implementation

Compliance tips: (1) Adopt a "sanctioned apps only" approach and document exceptions with a risk acceptance record; (2) Automate evidence collection where possible—export allowlist and firewall configs quarterly and store in your compliance repo; (3) Use short, focused vendor questionnaires to reduce friction but require attestations for security controls; (4) Train staff on why personal cloud accounts are prohibited for work files and enforce via technical controls. Risks of not implementing: data exfiltration through unmanaged cloud services, loss of FCI/CUI, contract noncompliance leading to lost contracts or penalties, and failed audits that can impact future government procurement opportunities.

Summary: To demonstrate compliance with FAR 52.204-21 and CMMC 2.0 AC.L1-B.1.III, small businesses should inventory and classify external information systems, verify vendors with concise evidence, enforce strict allowlists and technical controls (proxy/CASB, firewalls, conditional access), and maintain clear documentation and logs for audit evidence—these steps reduce risk and create a repeatable audit trail that satisfies both contractual and regulatory expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes