🚨 CMMC Phase One started November 10! Here's everything you need to know →

7-Step Checklist to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.IX: Audit Logs and Physical Access Device Management

Practical 7-step checklist to configure, collect, protect, review, and retain audit logs from physical access devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 01, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, actionable 7-step checklist to meet the FAR 52.204-21 / CMMC 2.0 Level 1 control PE.L1-B.1.IX for audit logging and physical access device management under the Compliance Framework; it shows how to configure devices, centralize and protect logs, implement review processes, and document evidence so a small business can demonstrate compliance and improve physical security posture.

7-Step Checklist

Step 1 — Inventory and classify every physical access device

Start by creating an asset inventory specific to physical access: door controllers, badge readers, Bluetooth/phone-based access systems, turnstiles, electronic locks, elevator controllers, and door sensors. For each entry record model, firmware version, network connectivity (on-prem, VLAN, cloud-managed), log capability (syslog, API, CSV export), admin accounts, and vendor contact. For Compliance Framework mapping, tag devices that protect Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) so they receive higher assurance and logging levels. Example: a small IT services firm might list four exterior doors with HID controllers (firmware v2.3), two interior server-room magnetic locks, and the cloud-managed visitor kiosk (vendor: Kisi).

Step 2 — Enable and configure granular audit events

On each device enable all relevant audit events: access granted/denied, credential presented, badge revoked attempts, door forced/held open, tamper alerts, battery/health status, admin logins and configuration changes. Configure timestamps to use a centralized NTP server (prefer UTC) and set log format to structured output (JSON or CEF where available) to ease parsing. Where possible, configure devices to forward logs over TLS (syslog over TLS, RFC 5425, commonly TCP/6514) rather than unencrypted UDP/514. Example configuration note: on many controllers you can set Syslog Server = 10.10.10.5, Port = 6514, Protocol = TLS, Log Level = Info/Events/Alarms.

Step 3 — Centralize collection and define retention policies

Collect physical access logs to a centralized repository (syslog server, SIEM, or hosted log service). For small businesses, an affordable stack is rsyslog or syslog-ng forwarder → Elasticsearch/Logstash/Kibana (ELK) or a managed SIEM like Datadog or LogRhythm Cloud. Define retention based on contractual and risk needs — a reasonable baseline is 90 days readily searchable and 1 year encrypted archived (S3 with Object Lock/WORM for immutability is a low-cost option). Ensure indexes include fields: user_id, credential_id, reader_id, event_type, door_state, timestamp, and event_id for correlation. Centralization makes audits simpler and ensures logs are not lost if a device is replaced.

Step 4 — Protect log integrity and control access

Protect log integrity with technical and procedural controls: restrict access to the log server via RBAC and MFA, encrypt logs at rest (AES-256), enable TLS for transport, and implement append-only storage or immutability where available (WORM, S3 Object Lock). Consider hashing critical log exports (SHA‑256) and storing hashes offsite or in a separate ledger for tamper detection. Limit device admin accounts and require unique admin accounts (no shared root) so changes and log access are attributable. Compliance tip: record who can change log configurations in your system security plan and require vendor change notifications for cloud-managed devices.

Step 5 — Monitoring, alerts, and scheduled reviews

Create monitoring rules to detect anomalous physical access patterns: repeated denies clustered on one reader, multiple different credentials used in quick succession (possible badge cloning), door forced or held-open events after hours, or admin console logins from unfamiliar IPs. Configure alerts to email/SMS/incident system and assign clear escalation paths. Implement scheduled reviews — daily automated alert triage and weekly manual reviews of summary reports. For a small business, assigning a single security lead and a backup for weekly reviews keeps workload manageable while providing evidence of ongoing oversight.

Step 6 — Incident response, evidence preservation, and forensics

Define how physical access logs integrate with your incident response playbook. When an anomalous event occurs, preserve the relevant log range immediately (export with timestamps), capture CCTV footage for the same time window, and compute cryptographic hashes of exported files for chain-of-custody. For small organizations without a SIEM for automated export, document a manual process: export logs to an encrypted laptop, compute SHA‑256, store both the export and hash in a secured archive, and log the handling steps. This procedure demonstrates you can, and do, preserve evidence required by auditors or incident responders.

Step 7 — Document policies, test controls, and train staff

Document policies and procedures for physical access logging: configuration standards, retention schedule, review frequency, incident handling, and vendor management. Test controls quarterly — simulate badge cloning or schedule "after-hours" entry to verify alerts and log capture. Train front-line staff and administrators on how to generate log exports, where logs are stored, and how to follow escalation procedures. For Compliance Framework audit readiness, maintain a small binder (electronic or physical) with configuration screenshots, sample exports, review logs, and test results tied to the control PE.L1-B.1.IX.

Risk of not implementing this control

Failing to capture, protect, and review audit logs from physical access devices leaves you blind to unauthorized entry and tampering, increases the chance of undetected insider misbehavior, and prevents forensic analysis after an incident; noncompliance can lead to failed audits, contract penalties, loss of federal contracts, and reputational harm. From an operational standpoint, lack of logs makes it impossible to correlate physical events with network incidents (e.g., a server room breach followed by suspicious network traffic) and therefore delays mitigation.

Summary — meeting FAR 52.204-21 and CMMC Level 1 PE.L1-B.1.IX is achievable for small businesses by following this seven-step checklist: inventory devices, enable detailed logging and secure transport, centralize and retain logs, protect integrity, monitor and review frequently, integrate logs into incident response, and document plus test procedures. Implementing these practical measures not only supports Compliance Framework evidence requirements but materially reduces risk to people, facilities, and sensitive data.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes