🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Azure AD Conditional Access to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI

Step-by-step guidance to use Azure AD Conditional Access to enforce authentication controls required by FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI), including practical settings, testing tips, and small-business examples.

•
March 27, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows how to configure Azure AD Conditional Access to satisfy the identity/authentication expectations in FAR 52.204-21 and CMMC 2.0 Level 1 (Control IA.L1-B.1.VI) by enforcing stronger authentication, controlling access conditions, and documenting changes so small businesses can demonstrate compliance.

Why this control matters and the risk of not implementing it

IA.L1-B.1.VI and the FAR basic safeguarding clause require organizations to ensure only authorized users and devices access contractor information systems and to apply reasonable controls around authentication. Failing to implement Conditional Access leaves systems vulnerable to credential theft, unauthorized access to Controlled Unclassified Information (CUI), data exfiltration, and contract non‑compliance — which can lead to lost contracts, remediation costs, and reputational damage.

Implementation overview in Azure AD: what you need and high-level design

Azure AD Conditional Access is the primary tool to enforce contextual policies (who, where, device, app) and is available with Azure AD Premium P1 (or higher). At a minimum, design a small set of policies: (1) Block legacy authentication, (2) Require Multi-Factor Authentication (MFA) for interactive access to cloud apps and remote access, (3) Require compliant or hybrid‑joined devices for access to sensitive data where applicable, and (4) Harden administrator accounts with stricter MFA and session controls. Use "Report-only" mode first and exclude break-glass accounts while testing.

Step-by-step Conditional Access policy recommendations

Follow these practical steps in the Azure portal: Azure Active Directory → Security → Conditional Access → New policy. Key configuration items: Assignments: include All Users (or selected groups) and explicitly exclude at least two break-glass emergency accounts and service principals. Cloud apps: start with "All cloud apps" and later refine to specific apps (Exchange Online, SharePoint, Azure Management). Conditions: enable "Locations" to include Named Locations (trusted corporate IPs) and mark unknown as requiring stronger controls; enable "Client apps" to block legacy authentication (POP/IMAP/SMTP) by excluding modern clients only if necessary; enable "Device platforms" if you want to limit access to supported OS types. Grant controls: choose "Require multi-factor authentication" and optionally combine with "Require device to be marked as compliant" (Intune) or "Require hybrid Azure AD joined" for managed machines. Session controls: use "Sign-in frequency" to require reauthentication for high-risk resources. Save the policy in Report-only, monitor sign-ins in the Sign-in logs, and then enable the policy once validated.

Practical technical details and small-business scenarios

Example 1 (25-person small business using Microsoft 365 Business Premium): enable a CA policy requiring MFA for all users accessing Exchange Online/SharePoint, require devices be marked compliant by Intune for access to SharePoint, and block legacy authentication. Before enabling, enroll laptops in Intune (automatic device compliance via policies for OS patching and disk encryption). Example 2 (contractor/vendor remote access): create a policy that requires MFA and only allows access from compliant devices or approved locations (vendor VPN public IPs added as Named Locations) and deny access from anonymous IP ranges. Example 3 (administrators): create a dedicated "Admins - Require MFA + Compliant Device" policy scoped to privileged roles; use Microsoft Entra Privileged Identity Management (PIM) if available, and ensure break-glass admin accounts are offline and stored securely.

Testing, licensing, and operational tips

Conditional Access requires Azure AD P1; if your organization lacks P1, enable Security Defaults as an interim step (this enforces MFA for admins and blocks legacy auth but is less granular). Always start with Report-only mode and observe the Sign-in logs and Conditional Access insights to tune policies and identify unintended blocks. Implement monitoring and alerting: create Azure Monitor / Sentinel queries to flag failed sign-ins, risky sign-ins, and policy denials. Maintain a documented change log for each policy change (who, what, why, rollback plan) to support compliance evidence requests.

Compliance tips and best practices

Best practices: (1) Maintain at least two emergency break-glass accounts excluded from CA, secured by long passwords stored in a hardened vault and MFA with hardware tokens; (2) avoid excluding large groups — use targeted exclusions only; (3) favor Authenticator app or FIDO2 security keys over SMS/voice; (4) block legacy authentication across the tenant; (5) enforce conditional access for privileged roles with stricter controls; (6) document policy scope and rationale in your Compliance Framework evidence repository (policy name, creation date, scope, testing notes). Review policies quarterly and after major changes in business processes or threat landscape.

Real-world example of policy evolution for compliance

A real small business I worked with began with Security Defaults to meet an immediate requirement. After budget approval for Azure AD P1 and Intune, they: (1) added device compliance policies in Intune for BitLocker and passcodes; (2) created a tiered Conditional Access model — baseline MFA for all users, stricter MFA + compliant devices for data stores with CUI, and highest protection for administrators; (3) used Named Locations to permit trusted office IPs and block other countries; and (4) produced a one‑page control mapping that linked each CA policy to the specific FAR/CMMC practice and the evidence artifacts (policy export, sign-in logs, Intune compliance reports). This sequence provided an audit trail and demonstrable enforcement for contract reviews.

In summary, implementing Azure AD Conditional Access to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 (IA.L1-B.1.VI) means enforcing MFA, blocking legacy authentication, requiring device compliance for sensitive access, and documenting changes and monitoring enforcement; start small with report-only testing, use break-glass controls, and scale policies to cover cloud apps and privileged roles so your small business can both reduce identity risk and produce the evidence auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes