🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to use network segmentation and zero-trust principles to verify and restrict external connections for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Practical guide to using network segmentation and zero-trust controls to verify and restrict external connections for FAR 52.204-21 / CMMC 2.0 Level 1 compliance.

•
April 15, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how small businesses can implement network segmentation and zero-trust principles to verify and restrict external connections in order to meet FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.III requirements under the Compliance Framework.

What the control requires (high level)

AC.L1-B.1.III expects organizations to verify and restrict external connections to systems processing, storing, or transmitting controlled unclassified information (CUI) or other covered data — in practice this means applying controls that ensure only authorized, authenticated, and properly configured endpoints and users can establish external connections to your network or systems. For the Compliance Framework, that translates to documented network separation, enforceable access decisions, monitoring of allowed external flows, and evidence of verification steps (logs, attestations, or automated posture checks).

Network segmentation: practical, actionable steps

Start with a simple, enforceable segmentation plan: map assets, classify them by function and data sensitivity, and create VLANs/subnets to separate user workstations, servers (including CUI-handling systems), guest Wi‑Fi, and OT/IoT devices. Implement "deny by default" ACLs on your edge and core switches/routers so that cross-segment traffic must be explicitly allowed. For small businesses that lack enterprise gear, use a UTM (pfSense/OPNsense, Cisco Meraki, Fortinet) to enforce inter-VLAN routing rules: e.g., allow VLAN 10 (workstations) to reach VLAN 20 (CUI servers) only on TCP/443 and only to a specific server IP; block everything else.

Applying zero-trust principles to external connections

Zero trust means never trust, always verify: enforce identity and device posture before permitting external access. Replace broad VPN trusts with identity-aware access (ZTNA) or cloud access proxies that verify user identity (SAML/OIDC), require MFA, and check device posture (up-to-date OS, disk encryption, endpoint protection). For remote contractors or third parties, use per-application proxies (Cloudflare Access, Zscaler Private Access, or an open-source overlay) that issue short-lived session tokens and limit access to a specific application rather than the whole network.

Technical configurations and examples

Be specific: implement egress and ingress allowlists, not blacklists. Example iptables pattern for a workstation that may only contact a single external API endpoint over HTTPS: iptables -A OUTPUT -p tcp --dport 443 -d 198.51.100.10 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT; iptables -A OUTPUT -p tcp --dport 443 -j REJECT. On perimeter firewalls enforce source IP/VLAN to destination IP/service rules, log matches, and drop everything else. Use DNS filtering (Pi-hole, Cisco Umbrella) and TLS inspection for necessary traffic to verify SNI and certificate validity. For device-level verification, deploy 802.1X with RADIUS for wired/wireless NAC or use agent-based posture checks from your ZTNA provider; require NAC to place devices failing posture into a remediation VLAN with no external connectivity.

Small business scenarios and real-world examples

Example 1: A small software shop handles CUI on a single server. Create a DMZ VLAN for the server, put developer laptops on a separate VLAN, and only allow SSH from a jump host that requires MFA and hardware-backed keys. Log the jump host sessions and keep ACLs documented. Example 2: A marketing firm uses cloud-based CRM and accepts contractor uploads: grant contractors access via ZTNA to only the CRM app, require device attestation via an endpoint agent, and restrict uploads to the CRM’s IP ranges; avoid giving contractors VPN access to the internal network.

Compliance tips and best practices

Document everything: network diagrams, VLAN/subnet lists, firewall ACLs, ZTNA policies, device posture checks, and change control tickets. Automate verification where possible — use configuration management to generate evidence (e.g., export firewall rules and timestamped logs). Schedule quarterly reviews of allowlists and conduct penetration tests or vulnerability scans after segmentation changes. Ensure logging/retention meets evidence needs: centralized syslog/flow logs (NetFlow/IPFIX) or a lightweight SIEM for small shops (Elastic, Splunk Light, or cloud-native logging) to prove connections were restricted and verified.

Risks of not implementing these controls

Without segmentation and zero-trust verification, an external compromise (phishing, exposed credential) can pivot across your network and reach CUI systems, causing data loss, contract penalties under FAR 52.204-21, and failing a CMMC assessment. Unrestricted external connections increase attack surface, make forensic analysis harder, and reduce your ability to demonstrate that only authorized entities accessed covered systems — which can lead to audit findings, loss of contracts, and reputational harm.

Summary: For Compliance Framework adherence to FAR 52.204-21 / CMMC AC.L1-B.1.III, combine clear segmentation, strict firewall/ACl policies, identity- and device-based verification (zero trust), logging, and documentation. Start small (VLANs + UTM + ZTNA) and iterate, prioritize "deny by default," maintain allowlists, and keep evidence trails to demonstrate verification and restriction of external connections.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes