🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

Step-by-Step Implementation Guide: Controlling Information on Publicly Accessible Systems β€” FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV

Practical step-by-step guidance to prevent public exposure of covered contractor information under FAR 52.204-21 and meet CMMC 2.0 Level 1 control AC.L1-B.1.IV.

β€’
April 08, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide explains how small businesses and contractors can implement the FAR 52.204-21 requirement mapped to CMMC 2.0 Level 1 control AC.L1-B.1.IV β€” controlling information that appears on publicly accessible systems β€” with clear, actionable steps, technical configurations, and real-world examples to reduce the risk of leaking Federal Contract Information (FCI) or other sensitive content.

Understanding the requirement

FAR 52.204-21 requires basic safeguarding of covered contractor information systems, and the CMMC Level 1 practice AC.L1-B.1.IV focuses on ensuring that information is not published or disclosed on public-facing systems without authorization. In practical terms this means: identify what constitutes FCI/CUI or sensitive business data, prevent it from being posted publicly (websites, cloud storage, code repositories, social media), and enforce approval and technical controls to block accidental or intentional exposure.

Step-by-step implementation (high level)

1) Inventory and classify content

Start with a short discovery sprint: inventory public-facing assets (websites, subdomains, S3/Blob containers, GitHub/Git repos, shared drives, marketing platforms, social accounts) and classify data that touches those assets. Use automated scans (e.g., truffleHog/gitleaks for repos, AWS CLI to check S3 public access) plus manual review. Example commands: aws s3api get-public-access-block --bucket BUCKET_NAME and gitleaks detect --source=. to find secrets or sensitive files in repos. Tag assets with owner and data classification (Public, Internal, FCI/CUI) in a simple spreadsheet or CMDB.

2) Policy, approval workflows, and roles

Create a short written policy that forbids posting FCI/CUI on public systems without an authorized exception and documents the approval workflow for publishing sensitive-but-allowed content (e.g., redacted excerpts, sanitized diagrams). Assign clear roles: Content Owner (business), Approver (security/data owner), and Publisher (web admin). For small teams, implement a pull-request-based content publishing process in your CMS or repository so approvals are visible and auditable before live publishing.

3) Technical controls to block accidental publication

Apply layered technical controls: enable DLP and pattern-based blocking in Microsoft 365 or Google Workspace (create sensitive-information rules for FCI/CUI markers and regular expressions such as SSN \b\d{3}-\d{2}-\d{4}\b as examples), configure web application firewalls (Cloudflare/WAF) to block uploads containing sensitive patterns, disable anonymous write or public access on cloud storage (S3: BlockPublicAccess, Azure: Disable blob public access), and enforce Git hooks (git-secrets, pre-commit) to stop commits that include secrets. For CMSs (WordPress/Drupal), disable file uploads for non-trusted roles, turn off directory listing (Apache: Options -Indexes; nginx: autoindex off), and remove debug/verbose output from production builds.

4) Developer & publishing hygiene

Keep development and production accounts separated: no production secrets in development repos or public demo environments. Use secret managers (AWS Secrets Manager, Azure Key Vault) and environment variables for runtime secrets; never hardcode keys in code that could be published. Use scanning tools in CI pipelines (GitHub Actions with truffleHog/gitleaks) to fail builds if sensitive data is detected. For example, add a GitHub Action step that runs gitleaks and fails the pipeline on matches, and configure pre-deploy approvals for any change to public assets.

5) Monitoring, logging and response

Monitor for accidental exposures: set up automated alerts for newly public S3 buckets (AWS Config rule or CloudWatch Event), use a SIEM or log aggregation (Splunk, Elastic) to capture webserver logs and publishing events, and subscribe to GitHub/third-party monitoring for exposed secrets. Establish a simple incident response playbook that includes takedown steps, notification to contracting officers (if FCI/CUI involved), rotating compromised keys, and root-cause review. For small businesses, keep the playbook to 1–2 pages with clear phone numbers and responsibilities.

Real-world small-business scenarios

Example 1: A marketing contractor uploads a PDF SOW to the public website that contains contract numbers and client PII. Prevent this by requiring review/approval for all PDFs pushed to the /assets/uploads/ directory, enforce a CMS workflow with a β€œreview required” flag, and add a DLP rule that scans attachments for contract number patterns before upload. Example 2: A developer pushes code with API keys to a public GitHub repo. Prevent via pre-commit hooks and CI scans, plus a policy that all keys must be stored in a secrets manager and rotated immediately if exposed.

Risks of not implementing this control

Failure to control information on public systems can lead to immediate operational and compliance consequences: loss of contracts, suspension from future federal procurements, mandatory breach notifications, reputational damage, and facilitation of cyberattacks (credential harvesting, targeted phishing, exploitation of exposed architecture). Small businesses can face outsized impact because remediation and legal costs consume limited resources β€” and a single public leak can trigger termination of a DoD contract if it exposes FCI/CUI.

Compliance tips and best practices

Keep controls proportional and document them: maintain a short control implementation record that maps each public asset to the technical control used (DLP, WAF, ACL, approval workflow). Automate where possible: CI/CD checks, automated bucket checks, and mail flow rules to block outbound emails with restricted keywords. Train staff quarterly on what constitutes FCI/FCI markers and run tabletop exercises for content publishing incidents. Finally, adopt "assume sensitive" by default: if in doubt, mark content internal and trigger the approval workflow rather than publishing immediately.

Summary β€” implementing AC.L1-B.1.IV is practical and achievable for small businesses: inventory assets, enforce simple policies and an approval workflow, apply targeted technical controls (DLP, storage ACLs, repository scanning, CMS restrictions), and monitor for exposures. These steps reduce the chance of accidental public disclosure, align you with FAR 52.204-21/CMMC 2.0 Level 1 expectations, and protect both your company and your federal contracts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes