As part of achieving CMMC Level 1 compliance, small businesses handling Federal Contract Information (FCI) must implement foundational cybersecurity practices. One of the core requirements is Access Control (AC), specifically AC.L1-B.1.I, which states:
"Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems)."
This requirement sounds straightforward, but to truly meet it—and pass a CMMC assessment—your organization needs clear, enforceable access policies and technical controls. In this blog post, we'll walk through what this requirement means, why it matters, and how to meet it effectively.
Ensure that only authorized users, processes, and devices have access to the information system. Let’s define them:
Authorized users: Employees, contractors, or vendors with legitimate need.
Processes acting on behalf of users: Apps or services that run with a user’s permissions (like email clients or backup tools).
Authorized devices: Company laptops, phones, or other systems explicitly permitted to connect.
Document Authorized Users and Limit User Access
Document Authorized Devices and Limit Device Access
Document Processes Acting on Behalf of Authorized Users and Limit Access
It is important to remember that the control AC.L1-B.1.I is only one of several controls in the Access Control domain for CMMC level 1. Having more comprehensive access controls will require you to implement the other remaining access controls, however, properly implementing AC.L1-B.1.I will ensure that you have a solid foundation.
Quick & Simple
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you