🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use MFA, Least Privilege, and RBAC to Limit System Access: FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I Implementation Guide

Step-by-step guide to enforce MFA, least privilege, and RBAC to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I for small businesses.

April 01, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This implementation guide explains how to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.I by combining multi-factor authentication (MFA), least-privilege principles, and role-based access control (RBAC) to limit system access — with practical steps, configuration examples, and small-business scenarios you can apply immediately.

Understanding the requirement and objectives

FAR 52.204-21 requires contractors to provide basic safeguarding of contractor information systems that process, store, or transmit federal contract information; CMMC 2.0 Level 1 (AC.L1-B.1.I) expects basic cyber hygiene, specifically limiting access to authorized users and devices. The key objectives are straightforward: authenticate users robustly, restrict privileges to only what is needed to perform tasks, and organize permissions so they are manageable, auditable, and reproducible.

Implementation roadmap — start with an inventory and baseline

Inventory and access baseline

Begin by creating an access inventory: list all user accounts (employees, contractors, vendors), service accounts, privileged accounts, and the systems they access (cloud consoles, SSO, VPN, file shares, business apps). For a small business this can be done in a spreadsheet or exported from your IdP (Azure AD, Okta, Google Workspace) and cloud providers (AWS IAM, GCP IAM). Capture group memberships, last sign-in, MFA status, and whether accounts are enabled. This baseline drives targeted changes and provides evidence for compliance reviews.

Enforce MFA everywhere

Enable MFA for all interactive access: IdP console, email, VPN, remote desktop, and administrative consoles. Prefer phishing-resistant methods (FIDO2/WebAuthn keys like YubiKey) or authenticator apps (TOTP) over SMS. Example configurations: Azure AD Conditional Access policy requiring MFA for all users and all Windows Remote Desktop connections via Azure AD Joined devices; Okta sign-on policy that blocks requests without MFA from untrusted networks; AWS requiring MFA for console access and using aws:MultiFactorAuthPresent condition in IAM policies. For remote access, integrate VPN with your IdP (SAML) and enforce MFA at authentication, not just on the VPN device.

Apply least privilege and RBAC

Define roles based on job function (finance, HR, IT admin, developer) and map required permissions to those roles — avoid granting broad groups like "Domain Admin" unless absolutely necessary. In AWS, use IAM roles and permission boundaries to create narrowly-scoped policies (least-privilege JSON policies referencing specific S3 buckets or API actions). In Microsoft 365/Azure, create custom RBAC roles or use built-in roles and restrict assignment to resource groups. Implement policy that all administrative tasks are performed from dedicated admin accounts and use just-in-time (JIT) elevation (Azure AD PIM or equivalent) where possible to reduce standing privileges.

Service accounts, secrets, and privileged access management

Treat service accounts differently: do not embed long-lived keys in code. Use managed identities (Azure Managed Identities, AWS IAM roles for EC2/Lambda) and secret stores (AWS Secrets Manager, Azure Key Vault, HashiCorp Vault) with automatic rotation. Use a lightweight Privileged Access Management (PAM) or session broker for administrators if budget allows — for small businesses, enforce MFA, unique admin accounts, and use time-limited IAM roles rather than static privileged credentials.

Practical small-business examples and step-by-step tasks

Example 1 (Office 365 + Azure AD, ~20 users): enable baseline security in Microsoft 365 Security Center, require 2-step verification and block legacy authentication, create groups for Finance/HR/IT and apply SharePoint/Exchange access by group, enable Conditional Access for MFA & device compliance, and set monthly access review tasks in Microsoft Entra. Example 2 (AWS workloads): disable root access (protect root with MFA), create IAM groups/roles for Dev/Ops/Finance, use least-privilege policies for S3 buckets and DynamoDB tables, enable CloudTrail and config recording, and require MFA for console/API calls that change IAM resources. Typical time to implement for a small shop: 1–4 weeks to inventory and enforce MFA; another 2–6 weeks to refactor permissions into roles and deploy least-privilege policies.

Compliance evidence, monitoring, and risks of noncompliance

Collect evidence: IdP reports showing MFA enforcement, exports of group memberships, screenshots of RBAC role assignments, logs of access reviews, and policy documents describing account provisioning/deprovisioning processes. Set up continuous monitoring: forward sign-in events and CloudTrail logs to a central location (SIEM or low-cost log store) and alert on suspicious activity (failed MFA attempts, new admin role creations). Risks of not implementing include unauthorized disclosure of contractor or CUI data, failed contract audits, potential contract termination or disallowance of costs, and reputational harm — all more likely if attackers can access systems with weak/no MFA or excessive privileges.

Tips, best practices, and practical controls to prioritize

Prioritize these low-friction controls: (1) Enforce MFA for all interactive logins with authenticator apps or hardware keys; (2) Disable legacy authentication and require modern protocols; (3) Create 4–6 standard RBAC roles that cover your business functions and remove “everyone full access” groups; (4) Use automated provisioning/deprovisioning (SCIM) tied to HR offboarding to reduce orphan accounts; (5) Require unique admin accounts and remove shared credentials; and (6) Run quarterly access reviews and record approvals. Avoid SMS-based OTPs when you can and prefer phishing-resistant second factors for privileged roles.

In summary, meeting FAR 52.204-21 and CMMC AC.L1-B.1.I is practical for small businesses when you combine a clear inventory, universal MFA, role-based least-privilege assignments, and logging/auditing to prove controls are working. Implement these steps iteratively: start with MFA and an access inventory, then move to RBAC/least-privilege, automate provisioning, and finally centralize logs and reviews — you’ll reduce risk and produce the evidence auditors and contracting officers expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes