This post explains how small businesses and contractors can build a practical access-control checklist to satisfy FAR 52.204-21 basic safeguarding expectations and the CMMC 2.0 Level 1 practice PE.L1-B.1.VIII (restricting equipment and operating environments), focusing on concrete steps, evidence you can collect, low-cost technical controls, and risk mitigation tactics you can implement this week.
Scope and objectives
Begin by scoping: identify where Controlled Unclassified Information (CUI) or other covered contractor information is stored, processed, or transmitted, and which equipment and operating environments are in scope. The objective of the checklist is to prove that only authorized devices and environments are used for covered work, that unauthorized peripherals and networks are blocked, and that physical and logical controls are documented and enforced. Evidence should map directly to the Compliance Framework practice and to your contract clauses.
Practical checklist — discovery and policy
Checklist item 1 (Inventory and data-flow): maintain a device inventory (CSV or asset database) that lists serial numbers, OS, owner, assigned user, location, and CUI access rights. Checklist item 2 (Policy definition): publish an "Equipment & Operating Environments" policy that states approved devices, allowed networks, minimum OS builds, approved peripherals (e.g., no USB storage unless encrypted and authorized) and specifies where CUI may be processed (e.g., only on corporate VLANs or company laptops). Checklist item 3 (Scope evidence): capture a data-flow diagram that shows CUI entry points, processing endpoints, and storage locations and link each device in the inventory to the diagram.
Practical checklist — physical controls
Checklist item 4 (Designated areas): designate rooms or work zones where covered work is allowed; control access with locks, badge readers, or keyed entry and post signage. Checklist item 5 (Visitor controls): maintain a physical visitor log or electronic check-in, require escorts in sensitive areas, and collect ID when necessary. Checklist item 6 (Environmental protections): ensure equipment is physically secured using cable locks or rack locks, and implement tamper-evidence for laptops and removable media storage—collect photographic evidence and a facility floorplan to show the areas and controls in place.
Practical checklist — technical controls
Endpoint and network controls
Checklist item 7 (Device hardening and enrollment): require corporate devices for covered work and enroll them in an MDM (e.g., Microsoft Intune, Jamf) with device compliance checks: block jailbroken/rooted devices, enforce disk encryption (BitLocker with TPM+PIN or FileVault), enforce screen lock timeout, and restrict local admin rights. Checklist item 8 (Network segmentation and access control): separate CUI traffic on a dedicated VLAN or SSID, enforce 802.1X network access control with RADIUS and EAP-TLS where feasible, and use NAC rules to block noncompliant devices. For small businesses without 802.1X, document compensating controls such as a dedicated wired VLAN and strong WPA3-Enterprise for Wi‑Fi, plus VPN with certificate-based authentication for remote access.
Operational controls and evidence collection
Checklist item 9 (Peripherals and removable media): disable USB mass-storage by GPO or MDM, allow only encrypted, registered removable devices, and log USB events centrally. Checklist item 10 (Monitoring and change control): enable endpoint logging (Windows Event Forwarding/Syslog), retain logs for the contract-defined period, and show change-control records when you modify approved equipment lists or policies. Collect artifacts: inventory export, MDM compliance reports, NAC logs showing denied connections, photos of locked rooms, policy documents, training acknowledgements, and sample audit reports to demonstrate implementation.
Small-business scenarios and low-cost implementations
Example A: a 12-person engineering subcontractor can meet requirements by issuing 6 company laptops, enrolling them in Intune and enforcing BitLocker, creating a dedicated VLAN for CUI on a managed switch, and using a simple badge lock for the server room; evidence is the Intune enrollment report, BitLocker recovery key log, VLAN configuration screenshot, and a photo of the locked door. Example B: a home-office contractor can restrict processing by using a company laptop for CUI, disabling personal device access with strict VPN conditional access, and tagging the laptop in the asset inventory; evidence includes VPN logs, MDM reports, and a signed policy acknowledging single-device use for CUI.
Risk if you don't implement these controls and closing summary
Failing to restrict equipment and operating environments increases the risk of accidental data exposure, unauthorized copying of CUI via removable media, malware infection from unmanaged devices, and audit failures that can lead to contract loss, remedial action, or reporting to contracting officers. Implementing the checklist items above yields clear, demonstrable evidence for FAR 52.204-21 and CMMC 2.0 Level 1 assessments: device inventory and enrollment reports, network/NAC logs, access-control photos, policies, and training records.
Summary: build a compact, evidence-driven access-control checklist by scoping covered locations and devices, enforcing simple physical and technical controls (MDM, disk encryption, VLAN/NAC), collecting specific artifacts (inventory CSV, MDM/NAC logs, photos, policy acknowledgements), and documenting procedures and changes; this approach gives small businesses a practical pathway to meet the Compliance Framework practice and to demonstrate compliance during audits and assessments.