🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Test and Validate Access Restrictions for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II: Audit and Penetration Techniques

Practical, step-by-step guidance on testing and validating access restrictions to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.II requirements for small businesses.

β€’
April 24, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Testing and validating access restrictions for FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.II) is a practical exercise in proving that accounts, roles, and resources enforce least privilege, produce adequate audit records, and resist simple abuse β€” this post walks you through an implementation-focused approach, real-world small-business examples, and concrete audit and penetration techniques you can use responsibly and repeatably.

Why this control matters for a small business

At a basic level, FAR 52.204-21 and CMMC 2.0 Level 1 require contractors to protect controlled unclassified information (CUI) and demonstrate basic cyber hygiene. AC.L1-B.1.II specifically targets the ability to detect, log, and resist unauthorized access through audit capability and testing β€” if access controls are misconfigured, a single compromised account or exposed API can lead to data leakage, failed contract requirements, or loss of future government work. For a small business this often translates into protecting Office 365, cloud storage (S3, Azure Blob), internal file shares, and the company VPN or remote access solutions.

Plan your testing: scope, authorization, and evidence

Define scope and obtain permission

Before any audit or penetration-style test, document a scope of systems (hostnames/IPs, cloud accounts, SaaS services) and get written authorization from contract owners. For third-party SaaS or vendor-managed systems, coordinate with the provider. A typical scope for a small business includes: identity provider (Azure AD/Okta), file servers (Windows file shares), cloud storage buckets, internal web apps/APIs, and VPN concentrators.

Test plan and evidence mapping

Create a test plan that maps each test back to artifacts required for compliance: user access lists, provisioning/deprovisioning logs, MFA configuration screenshots, audit log entries, vulnerability scan outputs, and screenshots/CLI output showing failed/successful access attempts. Use a consistent naming convention for evidence (e.g., evidence/YYYYMMDD-system-testname.{pdf,txt}) and store it in a secure evidence repository with limited access.

Audit techniques: verifying logs, retention, and coverage

Practical audit checks

Auditing is about proving that access events are recorded and actionable. For each system, verify that logs include user identifiers, timestamps, event types (success/failure), source IP, and object accessed. Example checks: on Windows AD, run Get-WinEvent/PowerShell to extract Security events (4624, 4625); for Linux, check /var/log/auth.log or use ausearch/ausearch -m USER_LOGIN; for cloud, retrieve CloudTrail logs (AWS) or Azure Activity Logs. For Office 365, export Unified Audit Logs via Security & Compliance Center or the Graph API. Verify retention by confirming log-storage policy or S3/Blob lifecycle and retention settings meet contractual retention (typically 90 days or as required by the contract).

Validate alerting: trigger a failed login and confirm the SIEM or log aggregation (Splunk, Elastic, Azure Sentinel) receives and indexes the event. Example: attempt an SSH login from a test VM with bad credentials and search the SIEM for "sshd failed password" within 1–2 minutes. Document the alert and the timeline for detection.

Penetration techniques (non-destructive): testing access restrictions

Controlled tests you can perform safely

Penetration techniques for compliance verification should be non-destructive and scoped. Examples include: role-based access testing (create test accounts for each role and attempt to access resources that should be restricted), horizontal privilege testing (user A attempting to view user B’s documents), and direct object reference checks (changing a resource ID in a URL to see if you can access another user’s record). Tools: OWASP ZAP or Burp Community for web app testing, curl for API calls, and simple scripts (Python requests) for automated checks. For local systems, use PowerShell and ls -l/stat to verify file and directory permissions.

Authentication/authorization bypass checks: confirm MFA is enforced by attempting a password-only login with a test account and verifying rejection; test session handling by capturing session cookies in a browser and trying session reuse or fixation scenarios. API keys and tokens: ensure keys are scoped and rotate a test key to validate that revocation takes effect. For cloud IAM (AWS/Azure/GCP) test least privilege by creating a test IAM user with minimal permissions and running a set of acceptance commands to confirm they cannot list or access restricted buckets/resources.

Real-world small-business scenarios and examples

Scenario 1 β€” Office 365: create three test accounts (employee, manager, contractor). Place a sensitive document in a SharePoint site accessible only to "employee" and "manager." Using the contractor account, attempt to access the document via UI and direct link (IDOR-style). Capture the audit log entry (Unified Audit Log) showing denied access and include timestamps and actor details as evidence.

Scenario 2 β€” AWS S3: a small defense subcontractor stores CUI in an S3 bucket. Create a test IAM user with S3:GetObject denied, attempt a GetObject via AWS CLI, and capture the 403 response. Then enable CloudTrail and show that the event is recorded with user ARN, action, and resource. Demonstrate remediation: update the bucket policy or IAM role, re-run the test, and capture the successful logged access.

Compliance tips and best practices

Maintain an access control matrix mapping roles to resources and review it quarterly; automate evidence collection where possible (scripts that pull audit logs, package them, and hash them for tamper-evidence). Use checklists for test types (positive/negative access tests, MFA enforcement, log retention). Keep a documented authorization workflow and a Plan of Action & Milestones (POA&M) for any findings. For penetration testing, always include a pre-test "blast radius" assessment and a rollback plan β€” take backups or snapshots before tests that could affect availability.

Risks of not implementing these tests

Failing to test and validate access restrictions increases risk of undetected data exposure, unauthorized privilege escalation, and audit failures. Consequences include contract termination, loss of future government work, regulatory fines, and reputational damage. Technically, a misconfigured ACL or missing log can allow an attacker to exfiltrate CUI without detection, which is precisely what compliance controls are meant to prevent.

Summary

Testing AC.L1-B.1.II for FAR 52.204-21 / CMMC 2.0 Level 1 is a repeatable, auditable process: plan and authorize tests, map tests to evidence, use safe non-destructive penetration techniques to validate access controls and MFA, and verify audit log completeness and retention. For small businesses, focusing on identity systems, cloud storage, file shares, and SaaS configuration β€” with documented test results and remediation steps β€” will provide strong demonstrable compliance and reduce operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes