This post shows how to configure Azure AD Conditional Access to satisfy the identity/authentication expectations in FAR 52.204-21 and CMMC 2.0 Level 1 (Control IA.L1-B.1.VI) by enforcing stronger authentication, controlling access conditions, and documenting changes so small businesses can demonstrate compliance.
Why this control matters and the risk of not implementing it
IA.L1-B.1.VI and the FAR basic safeguarding clause require organizations to ensure only authorized users and devices access contractor information systems and to apply reasonable controls around authentication. Failing to implement Conditional Access leaves systems vulnerable to credential theft, unauthorized access to Controlled Unclassified Information (CUI), data exfiltration, and contract non‑compliance — which can lead to lost contracts, remediation costs, and reputational damage.
Implementation overview in Azure AD: what you need and high-level design
Azure AD Conditional Access is the primary tool to enforce contextual policies (who, where, device, app) and is available with Azure AD Premium P1 (or higher). At a minimum, design a small set of policies: (1) Block legacy authentication, (2) Require Multi-Factor Authentication (MFA) for interactive access to cloud apps and remote access, (3) Require compliant or hybrid‑joined devices for access to sensitive data where applicable, and (4) Harden administrator accounts with stricter MFA and session controls. Use "Report-only" mode first and exclude break-glass accounts while testing.
Step-by-step Conditional Access policy recommendations
Follow these practical steps in the Azure portal: Azure Active Directory → Security → Conditional Access → New policy. Key configuration items: Assignments: include All Users (or selected groups) and explicitly exclude at least two break-glass emergency accounts and service principals. Cloud apps: start with "All cloud apps" and later refine to specific apps (Exchange Online, SharePoint, Azure Management). Conditions: enable "Locations" to include Named Locations (trusted corporate IPs) and mark unknown as requiring stronger controls; enable "Client apps" to block legacy authentication (POP/IMAP/SMTP) by excluding modern clients only if necessary; enable "Device platforms" if you want to limit access to supported OS types. Grant controls: choose "Require multi-factor authentication" and optionally combine with "Require device to be marked as compliant" (Intune) or "Require hybrid Azure AD joined" for managed machines. Session controls: use "Sign-in frequency" to require reauthentication for high-risk resources. Save the policy in Report-only, monitor sign-ins in the Sign-in logs, and then enable the policy once validated.
Practical technical details and small-business scenarios
Example 1 (25-person small business using Microsoft 365 Business Premium): enable a CA policy requiring MFA for all users accessing Exchange Online/SharePoint, require devices be marked compliant by Intune for access to SharePoint, and block legacy authentication. Before enabling, enroll laptops in Intune (automatic device compliance via policies for OS patching and disk encryption). Example 2 (contractor/vendor remote access): create a policy that requires MFA and only allows access from compliant devices or approved locations (vendor VPN public IPs added as Named Locations) and deny access from anonymous IP ranges. Example 3 (administrators): create a dedicated "Admins - Require MFA + Compliant Device" policy scoped to privileged roles; use Microsoft Entra Privileged Identity Management (PIM) if available, and ensure break-glass admin accounts are offline and stored securely.
Testing, licensing, and operational tips
Conditional Access requires Azure AD P1; if your organization lacks P1, enable Security Defaults as an interim step (this enforces MFA for admins and blocks legacy auth but is less granular). Always start with Report-only mode and observe the Sign-in logs and Conditional Access insights to tune policies and identify unintended blocks. Implement monitoring and alerting: create Azure Monitor / Sentinel queries to flag failed sign-ins, risky sign-ins, and policy denials. Maintain a documented change log for each policy change (who, what, why, rollback plan) to support compliance evidence requests.
Compliance tips and best practices
Best practices: (1) Maintain at least two emergency break-glass accounts excluded from CA, secured by long passwords stored in a hardened vault and MFA with hardware tokens; (2) avoid excluding large groups — use targeted exclusions only; (3) favor Authenticator app or FIDO2 security keys over SMS/voice; (4) block legacy authentication across the tenant; (5) enforce conditional access for privileged roles with stricter controls; (6) document policy scope and rationale in your Compliance Framework evidence repository (policy name, creation date, scope, testing notes). Review policies quarterly and after major changes in business processes or threat landscape.
Real-world example of policy evolution for compliance
A real small business I worked with began with Security Defaults to meet an immediate requirement. After budget approval for Azure AD P1 and Intune, they: (1) added device compliance policies in Intune for BitLocker and passcodes; (2) created a tiered Conditional Access model — baseline MFA for all users, stricter MFA + compliant devices for data stores with CUI, and highest protection for administrators; (3) used Named Locations to permit trusted office IPs and block other countries; and (4) produced a one‑page control mapping that linked each CA policy to the specific FAR/CMMC practice and the evidence artifacts (policy export, sign-in logs, Intune compliance reports). This sequence provided an audit trail and demonstrable enforcement for contract reviews.
In summary, implementing Azure AD Conditional Access to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 (IA.L1-B.1.VI) means enforcing MFA, blocking legacy authentication, requiring device compliance for sensitive access, and documenting changes and monitoring enforcement; start small with report-only testing, use break-glass controls, and scale policies to cover cloud apps and privileged roles so your small business can both reduce identity risk and produce the evidence auditors expect.