🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to build a step-by-step physical access checklist for compliance with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.VIII

Step-by-step guide to building a practical physical access checklist to meet FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.VIII requirements for small businesses.

•
April 11, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step approach to building a physical access checklist mapped to FAR 52.204-21 and CMMC 2.0 Level 1 (PE.L1-B.1.VIII) that small businesses can implement, document, and use as evidence during audits or contractor assessments.

Why this checklist matters

FAR 52.204-21 requires basic safeguarding of contractor information systems and CMMC Level 1 maps to similar basic cyber hygiene, including limiting physical access to systems and information. For small businesses handling Covered Defense Information (CDI) or operating under government contracts, an auditable physical access checklist demonstrates that you have consistent controls—visitor management, entry control, workstation protection, and media storage—and that these controls are enforced, tested, and recorded.

Key objectives and scope for the Compliance Framework practice

The Compliance Framework practice objective here is to create a repeatable artifact showing identification of physical assets, applied controls, monitoring, and evidence retention. Scope the checklist to: (1) all rooms where CDI is processed or stored, (2) network closets and server cabinets, (3) endpoints used for contract work, and (4) portable media storage. Define what counts as "access" (human entry, use of removable media, remote maintenance) and who is in-scope (employees, contractors, visitors, vendors).

Step-by-step checklist — Plan: identify assets, points of entry, and risk

Start by mapping your physical environment: list exterior doors, reception areas, internal doors to workspaces, server/network cabinets, and storage (cabinets, safes). For each asset record: location, business purpose, whether CDI is present, access frequency, and current controls (locks, badge readers, CCTV). Example for a small business: single-floor office with a lockable server closet and two conference rooms—your list should include key IDs, door IDs, and the single external entry used by visitors.

Step-by-step checklist — Implement: technical controls and configuration details

Specify exact controls for each entry point: mechanical locks with key-control for low-risk areas; electronic badge readers (recommend OSDP over legacy Wiegand where possible for encryption and tamper resistance) for areas with CDI; door contacts and door position sensors for server closets; and CCTV covering entrances with minimum 1080p resolution and 30 fps for clear facial recognition. Configure controllers to use TLS-encrypted management channels, ensure NTP-synchronized timestamps on logs, and set retention for access logs and video to a contract-appropriate period (common practice: 90–365 days; document your choice). For power-fail behavior, use fail-secure on server closet doors (remain locked during power loss) and fail-safe on fire-exit doors. For small businesses, cloud-managed access control systems (Kisi, Openpath, Brivo) provide reasonable security and audit trails without costly onsite infrastructure—record vendor SLA, data retention, and log export procedures as part of the checklist.

Step-by-step checklist — Verify: testing, logging, and evidence collection

Include test steps and acceptance criteria: monthly check that badge readers grant/deny access per role, quarterly review of access control list (ACL) against current employee list, weekly automated alerting for door-forced-open events, and spot checks of visitor logs and escort policy enforcement. Capture evidence: screenshots of ACL, exported access-event CSVs with timestamps correlated to NTP, CCTV clips for selected events, photos of locks/cabinet serials, and signed visitor logs. For compliance evidence, store a zipped archive (logs + screenshots + sign-off) in a secured repository and record hash/checksum for tamper-evidence.

Step-by-step checklist — Maintain: training, audits, and incident integration

Document frequency and owner for ongoing tasks: annual physical-security training annotated in personnel records (covering escorting, reporting tailgating, and media handling), quarterly internal audits of the checklist, and an incident playbook that maps physical incidents (lost keys, tailgating, damaged locks) to incident response steps and notification requirements. For small businesses at co-working spaces, add contractual controls (dedicated locked rooms, signed access rules with building management) and a documented process for remote wipe or decommissioning of devices when an employee leaves.

Compliance tips, best practices, and small-business scenarios

Practical tips: use least-privilege access with role-based badges, enforce two-person access for server closets for sensitive operations, timestamp and NTP-sync every log source for correlation, and retain artifacts with a simple naming convention (e.g., "PhysicalAccess_Audit_2026-04-01.zip"). Example scenarios: (A) A 10-person defense subcontractor uses a keyed server cabinet—upgrade to a badge-controlled cabinet or log key issuance and require dual custody for keys; (B) A small shop in a co-working space rotates employees—use encrypted external hard-storage safe and require a company-approved locking container. Best practices include mapping each checklist item back to the Compliance Framework evidence requirement, keeping ownership and review dates visible in the checklist, and automating exports of access logs to your SIEM or secure cloud storage for long-term retention and forensic readiness.

Risks of not implementing the requirement

Without a documented and enforced physical access checklist you risk unauthorized access to CDI, loss or theft of sensitive media, failed contract audits, contract termination, and regulatory fines. Operationally, a single unlocked server closet or unattended workstation can lead to lateral compromise of systems, exfiltration of data, or social-engineering attacks. The financial and reputational costs for a small business can be catastrophic—losing the ability to bid on or retain government contracts is a realistic outcome.

Summary: Build a clear, auditable physical access checklist that maps locations and controls to the Compliance Framework requirements, includes technical details (badge readers, CCTV specs, log retention), defines testing and evidence collection steps, and assigns owners for ongoing maintenance—this practical approach reduces risk and provides defensible evidence for FAR 52.204-21 and CMMC 2.0 Level 1 compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes