🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Configure Identity and Device Controls for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Practical Implementation for Small Defense Contractors

Practical, step-by-step guidance for small defense contractors to configure identity and device controls that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I requirements.

β€’
April 14, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Small defense contractors often must implement straightforward identity and device controls to meet FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.I) β€” the practical goal is to ensure only authorized users and devices access Controlled Unclassified Information (CUI) by applying predictable, enforceable identity and endpoint policies that are both affordable and auditable.

Implementation overview for Compliance Framework

At the Compliance Framework level, your primary objectives are: (1) identify and inventory users and devices that can access CUI; (2) enforce unique, authenticated identities for humans and managed devices; and (3) apply basic device controls β€” encryption, patching, anti-malware, and configuration baselines β€” so unmanaged or compromised devices can’t access sensitive systems. Implement these in bite-sized projects: inventory -> identity baseline -> device baseline -> conditional access -> monitoring.

Identity controls β€” actionable steps

Start by eliminating shared/local generic accounts and requiring unique identities for everyone who might access CUI. If you use cloud services (Microsoft 365, Google Workspace), turn on centralized identity (Azure AD / Google Identity) and enable multi-factor authentication (MFA) for all accounts that access CUI. Create an access-control policy that uses least privilege: assign users to role-based groups (e.g., "CUI-Access-Users") and give those groups only the permissions needed. For on-premises Active Directory environments, enforce Group Policy Objects (GPOs) to disable local Administrator use for daily activity and require complex passwords or passphrases aligned with your internal policy. Practical example: in Azure AD Conditional Access, create a policy that targets the "CUI-Access-Users" group, includes cloud apps containing CUI (SharePoint, Exchange), and has grant controls that require both MFA and a compliant device.

Device controls β€” what to deploy and how

Device controls should be enforceable and observable. Use a Mobile Device Management (MDM) system such as Microsoft Intune, Jamf, or a lightweight open-source alternative to require device enrollment for any device that will access CUI. Required device checks should include: disk encryption (BitLocker on Windows, FileVault on macOS), up-to-date OS patch level, firewall enabled, and an anti-malware agent running. Configure Intune device compliance policies (example settings: require BitLocker, minimum OS version Windows 10 22H2, and block jailbroken/rooted devices) and then tie those compliance rules to conditional access so only β€œcompliant” devices can sign in. For simple VPNs, require certificate-based authentication for the device plus MFA for the user rather than passwords alone.

Real-world small-business scenarios

Scenario A β€” 12-person subcontractor using Microsoft 365: Enroll company devices in Intune, create an Azure AD group "CUI-Users", enable Azure MFA for that group, and create a Conditional Access policy that requires devices to be marked compliant before accessing SharePoint or Teams folders containing CUI. Configure BitLocker via Intune Endpoint Security > Disk Encryption and enforce Windows Defender/EDR baseline. Document enrollment steps and collect screenshots of Intune compliance reports as evidence.

Scenario B β€” Legacy environment with on-prem AD and VPN: Maintain an up-to-date device inventory, require a certificate for VPN client authentication (issued via a small internal CA or public/private PKI provider), and enforce MFA at the VPN gateway (RADIUS integration with an MFA provider). Use Group Policy to enable BitLocker and configure Windows Update policies for patch cadence. If devices are unmanaged (personal laptops), block access to CUI systems entirely or provide a managed remote workspace (VDI) where the employer controls the endpoint.

Verification, monitoring and evidence for auditors

Collect and retain evidence such as user account lists, group membership exports, conditional access policy screenshots, Intune device compliance reports, VPN certificate issuance logs, and logs showing successful MFA events. Configure basic logging: audit Azure AD sign-ins (or AD logs for on-prem) and retain them according to your policy (a practical starting point is 90 days). Regularly review device inventory and disable or remove accounts associated with terminated personnel within 24–72 hours β€” document the process with ticket records or HR notifications to show auditors.

Compliance tips and best practices

1) Start small and iterate: enforce MFA and unique IDs first, then add device checks. 2) Use least privilege and role-based groups to reduce scope for mistakes. 3) Avoid granting CUI access from unmanaged devices; use an MDM or VDI. 4) Keep a simple runbook that shows how you onboard a new device (enroll to MDM, verify disk encryption, add to inventory). 5) Use password managers and consider hardware FIDO2 keys for privileged accounts. 6) Perform quarterly reviews of accounts and devices and keep screenshots or exports of the review as evidence. These practices align with the Compliance Framework emphasis on demonstrable, repeatable controls rather than complex tooling.

Risk of not implementing AC.L1-B.1.I controls

Poor or missing identity/device controls greatly increases the risk of unauthorized access to CUI, theft or exfiltration of defense-related data, contract non-compliance, government investigation, removal from bid lists, and reputational harm. For small contractors, a single compromised laptop or reused shared account can lead to a breach that results in lost contracts and regulatory penalties β€” all avoidable with basic identity hygiene and managed endpoints.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I is achievable for small defense contractors by taking a prioritized, documented approach: inventory users and devices, enforce unique identities and MFA, require enrollment and baseline compliance for devices, tie device compliance to conditional access, and retain simple but complete evidence for audits. Implement these controls in measurable steps, keep the processes documented, and review them regularly to stay compliant and protect CUI effectively.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes