🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to use IAM tools and configurations to meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI from setup to audit

Step-by-step guide to using identity and access management tools and configurations to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI, from initial setup through audit readiness.

•
April 09, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post walks through practical Identity and Access Management (IAM) implementations you can use to meet FAR 52.204-21 and the CMMC 2.0 Level 1 control IA.L1-B.1.VI under a Compliance Framework practice—covering design, configuration examples (Azure, AWS, Google/SSO providers), day-to-day operations, evidence collection, and common audit expectations for a small business.

Understand the requirement in the Compliance Framework context

At Level 1 CMMC and under FAR 52.204-21 the emphasis is on basic safeguarding: ensuring only authorized users access covered contractor information systems and that authentication mechanisms are implemented and verifiable. Within a Compliance Framework practice, treat this control as an identity lifecycle and access enforcement requirement: unique IDs for users, authentication (preferably MFA), account lifecycle (provisioning/deprovisioning), and logging sufficient to prove "who accessed what and when" during an audit.

Design an IAM approach that maps to the Practice

Design around a few core principles: least privilege, unique user identities (no shared logins), multi-factor authentication for all interactive accounts, automated provisioning/deprovisioning linked to HR, and logging/alerting for sign-in events. In the Compliance Framework documentation, map each technical control to a policy, a procedure, a responsible owner, and a piece of evidence. For example: an “Account Management” procedure (who creates accounts) maps to IAM groups/configurations (technical control) and to evidence (exported user list, onboarding tickets, deprovisioning timestamps).

Implementation examples and concrete configurations

AWS IAM (small-business setup)

Start by removing long-term root usage: enable hardware MFA for the account root and create an admin IAM user for emergency use. Create groups for roles (e.g., "Employees", "IT-Admins", "Contractors") and attach least-privilege policies (use AWS managed or custom policies scoped to specific actions and resources). Enforce MFA requirement by attaching an IAM policy that denies actions unless MFA is present, and enable IAM Access Analyzer. Turn on AWS CloudTrail for all regions and send logs to a centralized S3 bucket with object lock (or appropriate lifecycle), and enable AWS Config rules such as iam-password-policy and require-mfa-for-root. Evidence for audit: IAM user export (csv), MFA devices list, CloudTrail sign-in logs for the audit period, and IAM policy version history.

Azure AD / Microsoft Entra

For Office 365-centric small businesses, make Azure AD the identity source. Enforce Conditional Access policies: block legacy authentication, require MFA for all interactive logins (or at minimum for privileged roles), and require device compliance or specific trusted IP ranges for administrative access. Use Azure AD Identity Protection to detect risky sign-ins and enable sign-in logs and audit logs retention in Log Analytics / Sentinel or at least export to a secure storage account. Implement dynamic groups and SCIM provisioning for SaaS apps if supported. Evidence: Conditional Access policy screenshots/exports, sign-in logs with MFA claims, group membership exports, and a documented on/offboarding workflow correlated with HR records.

Okta / Google Workspace / SSO providers

If you use an identity provider (IdP) like Okta or Google Workspace, enforce 2-step verification for all users, enable app-level MFA requirements for SSO apps, and use SCIM to provision/deprovision accounts to downstream applications. Configure alerts for suspicious activity, disable legacy auth protocols where possible, and require context-aware access (e.g., geo/IP restrictions) for sensitive apps. Keep a record of provisioning approvals and automated deprovisioning events for audit trails.

Operational controls: daily/weekly/monthly tasks and audit evidence

Operationalize the technical controls: automate onboarding/offboarding (SCIM or scripted playbooks tied to HR tickets); run weekly checks that there are no active accounts without MFA; schedule quarterly access reviews where managers attest to user roles; and keep logs for sign-ins and admin actions for the audit window. For evidence, auditors expect: exported user lists with join/leave dates, MFA status snapshots, access review outputs (signed or logged attestations), configuration exports (e.g., JSON/XML of your Conditional Access / IAM policy set), and sign-in logs showing user authentication and MFA challenge events. Store these artifacts in a tamper-evident place (versioned document store or secure cloud bucket) and reference them in your Compliance Framework control mapping.

Real-world small-business scenarios and pragmatic trade-offs

Example 1: A 25-person subcontractor using Microsoft 365 can meet IA.L1-B.1.VI by enabling baseline Conditional Access, enforcing MFA for all employees, linking onboarding to Azure AD provisioning, and keeping sign-in logs for the audit period. Example 2: A 10-person firm on AWS with several contractors should disable root API keys, require MFA, create role-based groups, and use AWS CloudTrail & Config to detect changes—documenting each contractor’s start/end dates with ticketed approvals. For firms with limited budgets, prioritize MFA, unique accounts, and logs first—these give the most compliance value for little cost.

Risk of not implementing the control (and mitigation tips)

Failing to implement IA.L1-B.1.VI exposes you to unauthorized access, CUI exfiltration, loss of contracts, reputational harm, and possible contractual penalties. Specific technical risks include compromised shared accounts, credential stuffing on accounts without MFA, and no forensic trail to show who accessed data during an incident. Mitigations: enforce MFA, eliminate shared credentials, automate deprovisioning (reduce orphaned accounts), and keep a retention policy for logs that supports audit windows—plus a simple incident response runbook that references your IAM evidence stores.

In summary, meeting FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.VI is achievable for small businesses by combining clear procedures (account lifecycle, access reviews), practical IAM configurations (unique IDs, MFA, conditional access, disabling legacy auth), and retained evidence (user exports, MFA status, logs). Implement these controls incrementally: prioritize unique IDs and MFA, add automated provisioning/deprovisioning, enable logging/alerts, and maintain a Compliance Framework mapping and evidence repository to streamline audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes