🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide to Segmenting Public-Facing Systems from Internal Networks for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.XI

Practical, step-by-step instructions for segregating public-facing systems from internal networks to meet FAR 52.204-21 and CMMC 2.0 Level 1 (SC.L1-B.1.XI) requirements.

•
March 30, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Segregating public-facing systems from internal networks is a straightforward, high-impact control—required by FAR 52.204-21 and mapped in CMMC 2.0 Level 1 as SC.L1-B.1.XI—that reduces attack surface and limits the blast radius of internet-exposed services; this post gives a practical, step-by-step implementation approach for organizations (especially small businesses) seeking to meet Compliance Framework expectations and produce audit-ready evidence.

Why this control matters for Compliance Framework and CMMC / FAR compliance

The core goal of SC.L1-B.1.XI is to prevent an attacker who compromises a public-facing system (web server, VPN gateway, mail gateway, API endpoint, etc.) from easily reaching internal, sensitive systems that hold Controlled Unclassified Information (CUI) or contractor-owned resources. For Compliance Framework purposes, demonstrating segmentation shows you’ve applied basic safeguarding per FAR 52.204-21 and the CMMC Level 1 control set: evidence of technical separation (network and logical), documented architecture, and controls to restrict lateral movement.

Step-by-step implementation

Step 1 — Inventory and classify systems

Start with a complete inventory: list public-facing services (DNS, web, mail, remote access), the hosts and subnets they use, and the internal assets (file shares, admin consoles, databases) that must be protected. Tag systems with labels like "public", "dmz", "internal", and "cui" in your CMDB. For Compliance Framework documentation, produce a simple table or spreadsheet showing hostname, IP, role, owner, and classification. Example: web01.example.com — 203.0.113.45 (public DMZ) — hosts marketing site; file-server-01 — 10.1.2.5 — internal, stores CUI.

Step 2 — Design segmentation architecture (DMZ / VPC / VLAN)

Choose an architecture appropriate to your environment: on-premises DMZs with edge firewalls, VLANs with router ACLs, or cloud VPCs/subnets and security groups. Recommended pattern: place all internet-facing services in a DMZ or dedicated VPC/subnet with no direct route to internal subnets. Use stateful firewalls or cloud security groups between DMZ and internal networks. Example designs: (a) On-prem: DMZ subnet 192.0.2.0/24, internal 10.0.1.0/24, router ACLs deny DMZ->Internal except for specific API ports; (b) AWS: Public ALB in public subnet, app servers in a private DMZ subnet, internal database in a separate private subnet with no public IP, security groups only permit required flows.

Step 3 — Implement technical controls and least-privilege flows

Harden and restrict allowed traffic. Only permit inbound ports from the internet that are necessary (typically TCP 443 for web). Between DMZ and internal, implement allow-only rules: e.g., app servers may connect to backend API on 10.0.2.10:8443 and only from the app server subnet. Example firewall rules (conceptual): ALLOW tcp 0.0.0.0/0 -> DMZ_IP port 443; DENY all DMZ -> internal by default; ALLOW DMZ_APP_SUBNET -> INTERNAL_API_IP port 8443. For host-based controls, use iptables/ufw or Windows Firewall to limit management ports and restrict SSH/RDP to jump hosts or specific admin IPs. In cloud environments, implement security group rules: restrict outbound traffic from DMZ instances to only necessary internal endpoints and ports.

Step 4 — Protect the management plane and remote access

Do not allow direct admin access to DMZ or internal hosts from the internet. Implement jump boxes or bastion hosts placed in a restricted management subnet; require MFA and enforce access from known admin IPs (or via VPN). Example: administrative SSH available only to 198.51.100.10/32 and only to the bastion host; bastion is logged and uses MFA through an identity provider. For SaaS or vendor access, require contractor accounts be scoped to the DMZ or specific API endpoints and use temporary credentials where possible.

Step 5 — Monitoring, logging, and validation

Implement centralized logging for DMZ and internal devices (syslog, cloud logs, Azure Monitor, CloudWatch). Enable firewall logs and collect flow logs (VPC Flow Logs, NSG flow logs) so you can demonstrate enforcement. Schedule internal network scans and external vulnerability scans; run occasional penetration tests that validate segmentation. For Compliance Framework evidence, include network diagrams, firewall rule exports, security group configs, and recent scan/pen test reports.

Small-business real-world example

Consider a 35-person defense subcontractor with a public website, a cloud-hosted CRM, and an on-prem file share holding limited CUI. Practical implementation: host the public website in a managed cloud service (static site or cloud web hosting) in its own VPC subnet; do not store CUI there. Keep the on-prem file server on a separate VLAN with no inbound internet route; allow outbound VPN-only connections to cloud backups. Admin access to the file server is via an MFA VPN and a jump server; firewall rules allow only necessary backup/management ports from specific cloud IP ranges. Evidence to retain: VPC subnet map, firewall ACL snapshot, VPN configuration, and a short runbook describing emergency access procedures.

Compliance tips, technical specifics, and risk of not implementing

Practical tips: document all architecture decisions in plain language, enforce least privilege network rules, and automate rule deployment where possible (Terraform for cloud, Ansible for firewalls). Specific technical recommendations: use dedicated subnets/VLANs, enable network ACLs and stateful firewalls, block unnecessary outbound traffic from DMZ systems, and make admin ports accessible only via jump hosts. Risk if you don't implement: a public server compromise can quickly become an internal breach, causing CUI exposure, contract termination, costly incident response, reputational damage, and failure in an audit for FAR / CMMC requirements. Auditors will expect both design documentation and operational evidence that segmentation is effective.

Summary: Implementing SC.L1-B.1.XI is a tractable effort involving inventory/classification, clear DMZ/VPC/VLAN design, restrictive firewall/security group rules, protected admin paths, and logging/testing; for small businesses this can be achieved affordably using cloud native controls, managed hosting for external sites, and disciplined documentation—yielding a demonstrable compliance posture that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes