{
  "title": "How to Remediate Common Gaps for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II (Code 545): Actionable Fixes for Small Contractors",
  "date": "2026-04-11",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-remediate-common-gaps-for-far-52204-21-cmmc-20-level-1-control-acl1-b1ii-code-545-actionable-fixes-for-small-contractors.jpg",
  "content": {
    "full_html": "<p>Small government contractors commonly miss technical controls that limit unauthorized access via repeated authentication failures; this post gives practical, prioritized remediation steps to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.II (Code 545) within a Compliance Framework, using low-cost, operationally sound approaches that work for typical small-business environments.</p>\n\n<h2>What the requirement means (practical summary)</h2>\n<p>At a high level, AC.L1-B.1.II requires contractors to implement basic access controls that limit opportunities for attackers to gain access by guessing or repeatedly trying credentials. For small organizations this translates to implementing account lockout / throttling, sensible session controls, and monitoring for repeated failed authentications across endpoints, servers, VPNs and cloud services. The goal: reduce brute-force, credential-stuffing, and automated attacks while keeping legitimate work flowing.</p>\n\n<h2>Step-by-step remediation (Compliance Framework implementation)</h2>\n<h3>1) Inventory authentication endpoints and map to control</h3>\n<p>Start with a short inventory: list Windows endpoints (workstations/servers), Linux hosts, cloud identities (Azure AD, Google Workspace), VPN concentrators, firewall admin portals, and SaaS apps used for CUI or contract work. For Compliance Framework evidence, capture a CSV or spreadsheet with hostname, service, auth type (local, LDAP, SAML, OAuth), owner, and whether MFA is enabled. This mapping lets you scope where lockout/throttling is required.</p>\n\n<h3>2) Apply platform-specific lockout/throttling</h3>\n<p>Implement platform-specific controls using built-in features: for Windows domain-joined machines use Group Policy: Computer Configuration → Windows Settings → Security Settings → Account Policies → Account Lockout Policy. Recommended starting settings: Account lockout threshold = 5 failed attempts, Duration = 15 minutes, Reset count = 15 minutes. For standalone Windows use the net accounts command: <code>net accounts /lockoutthreshold:5 /lockoutduration:15 /lockoutwindow:15</code>. For Linux, enable PAM modules (faillock or pam_tally2) and configure /etc/pam.d/system-auth and /etc/security/faillock.conf; set deny=5 and unlock_time=900, and use MaxAuthTries in /etc/ssh/sshd_config to limit SSH attempts. For SSH and internet-facing services, add Fail2Ban to ban IPs with repeated failures (sudo apt install fail2ban and configure /etc/fail2ban/jail.local). For cloud identities, enable Azure AD Smart Lockout and Conditional Access, or equivalent in Google Workspace: enforce account protection and configure sign-in risk policies and MFA to reduce reliance on lockouts alone.</p>\n\n<h3>3) Protect remote access and network devices</h3>\n<p>Apply account throttling or IP blocking on VPNs, firewalls, and administrative consoles. Most enterprise VPNs have configurable lockout or connection throttle settings—use them. On small-business firewalls that lack lockout, implement geoblocking and rate-limit rules; or place management interfaces on a management VLAN with allowlist IPs. Document specific configurations (screenshots, exported configs) as Compliance Framework evidence.</p>\n\n<h2>Monitoring, detection, and operational controls</h2>\n<p>Lockouts are only effective when you detect and respond. Enable logging of failed logons: Windows Security event 4625, Linux auth logs (/var/log/auth.log or syslog), VPN and firewall logs. Forward these logs to a central collector — can be a low-cost SIEM (Azure Sentinel trial, Elastic Cloud, Splunk Free for small volumes) or an RMM that captures events. Create alerts for unusual spikes (e.g., > 50 failed logons in 10 minutes from a single IP, or multiple accounts failing from same source). Maintain a simple incident playbook: isolate the source IP, require password resets or enforced MFA, and open a ticket documenting remediation actions for auditors.</p>\n\n<h2>Operational guidance, thresholds, and exceptions</h2>\n<p>Balance security and availability: common safe defaults are 3–5 failed attempts before lockout, 15–30 minute lockout duration, and reset counter at the same interval. For critical admin accounts, prefer immediate secondary control (MFA + restricted management subnet) rather than long lockouts that allow denial-of-service via deliberate lockouts. Document approved exceptions and compensating controls (e.g., service accounts using key-based auth on Linux, documented and monitored), and include review intervals in your Compliance Framework (quarterly).</p>\n\n<h2>Examples and real-world scenarios for a small contractor</h2>\n<p>Example A: A 12-person contractor using Microsoft 365 and Intune — implement Azure AD Smart Lockout (default protects cloud accounts), enforce MFA for all users, configure Intune to require device compliance, and enable conditional access to block sign-ins from unfamiliar locations; collect Azure AD sign-in logs and export them weekly as evidence. Example B: A small engineering firm with an on-prem VPN and Linux build servers — apply Fail2Ban for SSH, limit VPN concurrent attempts, configure firewall rules to block repeated offenders, and store screenshots of config plus logs in your Compliance Framework evidence repository. Example C: A contractor using SaaS project tools — ensure SAML/IdP sessions enforce lockout at the identity provider layer and require MFA for admin roles.</p>\n\n<h2>Risks of not implementing this control</h2>\n<p>Failure to implement account throttling and monitoring increases risk of credential-based breaches: brute-force attacks, credential stuffing, and automated bot attacks can succeed more easily. Consequences include unauthorized access to CUI, data exfiltration, supply-chain compromise, contract termination, and reputational and financial damage. From a compliance standpoint, missing this control risks nonconformity with FAR 52.204-21 and failing a CMMC assessment, which can halt contract opportunities.</p>\n\n<h2>Compliance tips and audit-ready evidence</h2>\n<p>Keep an audit-friendly trail: export GPO reports, save screenshots of cloud policy settings, capture configuration files (/etc/pam.d/*, sshd_config, fail2ban configs), and archive log extracts that show both failed attempts and subsequent lockouts. Maintain a short procedure document that ties each technical control to the Compliance Framework requirement and include system owners' names and review dates. Run quarterly tests: simulate failed logons (from an isolated test account) and show that lockouts occur and are logged — record the test results.</p>\n\n<p>Summary: For small contractors, meeting AC.L1-B.1.II (Code 545) is straightforward and high-impact: inventory authentication points, implement platform-specific lockout/throttling and MFA where possible, enable centralized logging and alerts, document exceptions and configurations, and perform periodic tests. These actions reduce brute-force risk, provide clear Compliance Framework evidence, and protect access to CUI with minimal operational disruption.</p>",
    "plain_text": "Small government contractors commonly miss technical controls that limit unauthorized access via repeated authentication failures; this post gives practical, prioritized remediation steps to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.II (Code 545) within a Compliance Framework, using low-cost, operationally sound approaches that work for typical small-business environments.\n\nWhat the requirement means (practical summary)\nAt a high level, AC.L1-B.1.II requires contractors to implement basic access controls that limit opportunities for attackers to gain access by guessing or repeatedly trying credentials. For small organizations this translates to implementing account lockout / throttling, sensible session controls, and monitoring for repeated failed authentications across endpoints, servers, VPNs and cloud services. The goal: reduce brute-force, credential-stuffing, and automated attacks while keeping legitimate work flowing.\n\nStep-by-step remediation (Compliance Framework implementation)\n1) Inventory authentication endpoints and map to control\nStart with a short inventory: list Windows endpoints (workstations/servers), Linux hosts, cloud identities (Azure AD, Google Workspace), VPN concentrators, firewall admin portals, and SaaS apps used for CUI or contract work. For Compliance Framework evidence, capture a CSV or spreadsheet with hostname, service, auth type (local, LDAP, SAML, OAuth), owner, and whether MFA is enabled. This mapping lets you scope where lockout/throttling is required.\n\n2) Apply platform-specific lockout/throttling\nImplement platform-specific controls using built-in features: for Windows domain-joined machines use Group Policy: Computer Configuration → Windows Settings → Security Settings → Account Policies → Account Lockout Policy. Recommended starting settings: Account lockout threshold = 5 failed attempts, Duration = 15 minutes, Reset count = 15 minutes. For standalone Windows use the net accounts command: net accounts /lockoutthreshold:5 /lockoutduration:15 /lockoutwindow:15. For Linux, enable PAM modules (faillock or pam_tally2) and configure /etc/pam.d/system-auth and /etc/security/faillock.conf; set deny=5 and unlock_time=900, and use MaxAuthTries in /etc/ssh/sshd_config to limit SSH attempts. For SSH and internet-facing services, add Fail2Ban to ban IPs with repeated failures (sudo apt install fail2ban and configure /etc/fail2ban/jail.local). For cloud identities, enable Azure AD Smart Lockout and Conditional Access, or equivalent in Google Workspace: enforce account protection and configure sign-in risk policies and MFA to reduce reliance on lockouts alone.\n\n3) Protect remote access and network devices\nApply account throttling or IP blocking on VPNs, firewalls, and administrative consoles. Most enterprise VPNs have configurable lockout or connection throttle settings—use them. On small-business firewalls that lack lockout, implement geoblocking and rate-limit rules; or place management interfaces on a management VLAN with allowlist IPs. Document specific configurations (screenshots, exported configs) as Compliance Framework evidence.\n\nMonitoring, detection, and operational controls\nLockouts are only effective when you detect and respond. Enable logging of failed logons: Windows Security event 4625, Linux auth logs (/var/log/auth.log or syslog), VPN and firewall logs. Forward these logs to a central collector — can be a low-cost SIEM (Azure Sentinel trial, Elastic Cloud, Splunk Free for small volumes) or an RMM that captures events. Create alerts for unusual spikes (e.g., > 50 failed logons in 10 minutes from a single IP, or multiple accounts failing from same source). Maintain a simple incident playbook: isolate the source IP, require password resets or enforced MFA, and open a ticket documenting remediation actions for auditors.\n\nOperational guidance, thresholds, and exceptions\nBalance security and availability: common safe defaults are 3–5 failed attempts before lockout, 15–30 minute lockout duration, and reset counter at the same interval. For critical admin accounts, prefer immediate secondary control (MFA + restricted management subnet) rather than long lockouts that allow denial-of-service via deliberate lockouts. Document approved exceptions and compensating controls (e.g., service accounts using key-based auth on Linux, documented and monitored), and include review intervals in your Compliance Framework (quarterly).\n\nExamples and real-world scenarios for a small contractor\nExample A: A 12-person contractor using Microsoft 365 and Intune — implement Azure AD Smart Lockout (default protects cloud accounts), enforce MFA for all users, configure Intune to require device compliance, and enable conditional access to block sign-ins from unfamiliar locations; collect Azure AD sign-in logs and export them weekly as evidence. Example B: A small engineering firm with an on-prem VPN and Linux build servers — apply Fail2Ban for SSH, limit VPN concurrent attempts, configure firewall rules to block repeated offenders, and store screenshots of config plus logs in your Compliance Framework evidence repository. Example C: A contractor using SaaS project tools — ensure SAML/IdP sessions enforce lockout at the identity provider layer and require MFA for admin roles.\n\nRisks of not implementing this control\nFailure to implement account throttling and monitoring increases risk of credential-based breaches: brute-force attacks, credential stuffing, and automated bot attacks can succeed more easily. Consequences include unauthorized access to CUI, data exfiltration, supply-chain compromise, contract termination, and reputational and financial damage. From a compliance standpoint, missing this control risks nonconformity with FAR 52.204-21 and failing a CMMC assessment, which can halt contract opportunities.\n\nCompliance tips and audit-ready evidence\nKeep an audit-friendly trail: export GPO reports, save screenshots of cloud policy settings, capture configuration files (/etc/pam.d/*, sshd_config, fail2ban configs), and archive log extracts that show both failed attempts and subsequent lockouts. Maintain a short procedure document that ties each technical control to the Compliance Framework requirement and include system owners' names and review dates. Run quarterly tests: simulate failed logons (from an isolated test account) and show that lockouts occur and are logged — record the test results.\n\nSummary: For small contractors, meeting AC.L1-B.1.II (Code 545) is straightforward and high-impact: inventory authentication points, implement platform-specific lockout/throttling and MFA where possible, enable centralized logging and alerts, document exceptions and configurations, and perform periodic tests. These actions reduce brute-force risk, provide clear Compliance Framework evidence, and protect access to CUI with minimal operational disruption."
  },
  "metadata": {
    "description": "Practical, step-by-step remediation guidance for small contractors to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.II (Code 545) with minimal disruption.",
    "permalink": "/how-to-remediate-common-gaps-for-far-52204-21-cmmc-20-level-1-control-acl1-b1ii-code-545-actionable-fixes-for-small-contractors.json",
    "categories": [],
    "tags": []
  }
}