This post gives a practical, audit-ready plan to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 control PE.L1-B.1.VIII (Physical Access Implementation Checklist) for small businesses operating under the Compliance Framework, including technical configuration tips, concrete artifacts auditors expect, and real-world examples you can implement this month.
Core requirement and audit evidence
PE.L1-B.1.VIII is focused on implementing and documenting basic physical safeguards—restricting uncontrolled physical access to systems that store, process, or transmit Federal Contract Information (FCI) or Controlled Unclassified Information (CUI). For the Compliance Framework, the key objectives are: 1) limit entry to authorized individuals; 2) log and monitor access events; and 3) maintain procedural controls (policies, training, revocation). Auditors will expect policies and procedures, floor plans showing protected areas, access control system exports (user/badge lists and event logs), visitor records, camera footage retention information, and evidence of periodic reviews and corrective actions.
Implementation checklist — technical and procedural steps
Start with a written scope: identify rooms, racks, and devices that contain FCI/CUI and mark them on a floor plan. Implement physical barriers (doors, locks, cabinets) and one of the following access control approaches: a) electronic badge readers (recommended) with a central controller; b) keyed locks with documented key custody procedures (lower cost option); or c) cloud-managed controllers (SaaS) for small teams. Technical details: configure door controllers to log to a central syslog server (RFC 5424) or use the controller's export feature; enable NTP synchronization on all controllers; require 128-bit AES for badge communication where supported; ensure door state sensors and tamper switches are present for secure doors; where possible place controllers on a management VLAN and restrict access with ACLs. Document configurations by exporting user lists in CSV and retaining daily event logs (at minimum) for 90 days, with monthly aggregated exports for 1 year to satisfy most audit expectations.
Visitor and temporary access controls
Implement a visitor management process: use a paper log or an electronic visitor management system (Envoy, Traction Guest, or simple Google Forms for micro-businesses). Require badges or escorted access for visitors and contractors, capture name, organization, badge issued, escort name, entry/exit times, and purpose. For temporary contractors, create temporary user accounts/badges with automatic expiration (configure controller or access platform to expire accounts after the contract end date). Keep visitor logs and badge-issuance records as discrete artifacts; during an audit, provide a sampled period (e.g., last 3 months) showing visitors associated with events in the access logs and CCTV at the same timestamps.
Monitoring, logging, and retention
Configure CCTV cameras to cover entrances to protected areas and maintain timestamps synchronized to NTP. Technical recommendations: 1080p resolution minimum for entrance cameras, secure camera admin accounts (no default passwords), TLS for cloud uploads, and retention configured to at least 30–90 days depending on storage budget (longer if your contract requires). Export access control events in a standard format (CSV/JSON), include ISO 8601 timestamps, user ID, door ID, event type (grant/deny/door-forced), and source. Forward events to a central log server or SIEM (Splunk, ELK, or even a well-maintained syslog instance) for monthly review and to create alerting for anomalies like repeated denied attempts or after-hours access.
Small-business real-world examples
Example A — 12-person contracting shop with an open office: Use a cloud-managed door controller (e.g., OpenPath or Kisi) connected via PoE to the existing network and backed by a small UPS. Register employee badges and configure badge expiry linked to HR offboarding (manual process if no HRIS). Use a low-cost NVR or cloud service for camera retention at 60 days. Maintain an "Access Control" Google Sheet as an exportable artifact listing active badges, issuance dates, and assigned doors; save monthly exports as evidence. Example B — Microbusiness with two offices and limited budget: lock server cabinets with keyed cam locks, maintain a keyed lock log with key custodians, implement a visitor sign-in sheet, and pair with a cloud storage folder containing repeated photos and dated maintenance logs for locks and cameras. Both examples include a documented periodic review: monthly access list reconciliation and quarterly policy review.
Compliance tips and best practices
Design the system for least privilege—people only get access to the doors they need. Automate revocation by tying badge lifecycle to HR or using scheduled expiration for contractor badges. Keep an audit trail: export and timestamp access control logs regularly and keep them immutable (write-once storage or a controlled backup bucket). Maintain supporting artifacts: physical access policy, badge issuance procedure, visitor logs, maintenance tickets, training sign-in sheets, incident reports, and a remediation tracker for any weaknesses found. For audits, assemble a single evidence package with a readme that lists artifacts, date ranges, and the person responsible to streamline the auditor's review.
Risk of not implementing or documenting controls
Failure to implement or document physical access controls exposes organizations to unauthorized entry, insider theft, device tampering, and data exfiltration—risks that are particularly damaging when dealing with FCI/CUI. From a compliance perspective, incomplete or missing artifacts (no logs, no visitor records, or no policies) commonly lead to findings that can result in contract penalties, loss of ability to bid on government work, or corrective action plans imposed by primes or government auditors. Operationally, lack of access controls increases downtime risk (unauthorized power-off of servers), and liability if a data breach involving government data occurs.
Summary
To be audit-ready for FAR 52.204-21 / CMMC 2.0 Level 1 PE.L1-B.1.VIII, build a scoped implementation: map protected areas, deploy appropriate locks/readers, centralize and timestamp logs, enforce visitor and badge lifecycle processes, and collect the audit artifacts (policies, floor plans, log exports, camera retention metadata, training and revocation records). Small businesses can meet requirements cost-effectively with cloud-managed controllers, disciplined spreadsheet exports, and clear documented procedures—what matters to auditors is consistent evidence showing control operation, monitoring, and ongoing review. Start by creating a 90-day evidence package and a quarterly maintenance cadence; that will take you from "not prepared" to "audit-ready" quickly and defensibly.