🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Multi-Factor Authentication to Satisfy FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI: Practical Setup and Validation Steps

Step-by-step guidance to deploy and validate multi-factor authentication to meet FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI) requirements for small businesses.

•
April 15, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-factor authentication (MFA) is a foundational control for protecting federal contract information (FCI) and satisfying FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.VI; this post gives Compliance Framework–specific, hands-on steps to deploy MFA, integrate it with cloud and on-prem access, and collect the evidence auditors will want to see.

What the control expects and how to scope your rollout

The Compliance Framework requires reasonable safeguarding for systems that store or process FCI. For practical implementation, treat MFA as mandatory for: privileged accounts (administrators), remote access methods (VPN, RDP, SSH), contractor/vendor access, and any user accounts that access FCI or can access systems that do. Start by scoping your environment: inventory identity stores (Azure AD, Google Workspace, AD on-prem), remote access appliances (VPN, RD Web, Citrix), and service accounts that currently bypass interactive login.

Implementation steps (high-level, vendor-agnostic)

Follow these phased steps: (1) identify and classify accounts that need MFA; (2) choose supported MFA methods appropriate to risk (authenticator apps, hardware FIDO2 keys, enterprise MFA providers); (3) configure enforcement (conditional access policies, VPN RADIUS with MFA, per-user enforcement as needed); (4) enroll users and document exceptions; (5) log, monitor, and validate the configuration; (6) maintain policies and periodic revalidation. For small organizations, documenting a simple policy that lists who must use MFA and how exceptions are approved satisfies auditors as long as enforcement and evidence are present.

Concrete technical configurations — cloud examples

Azure/Microsoft 365: For many small businesses using Microsoft 365 Business or Entra ID, start with Security Defaults (turn on quickly) or, for richer control, use Conditional Access (Azure AD P1). At minimum enforce MFA for Global Administrators and for sign-ins to apps that access FCI. Google Workspace: enable 2‑Step Verification enforcement in the Admin console and set a 2‑step enforcement date, require Security Keys (FIDO) for admins if possible. AWS: enable MFA for the root account (hardware or virtual), require MFA for IAM users with console access, and enforce MFA in IAM policies or with SCPs where applicable.

Concrete technical configurations — on-premises and remote access

SSH (Linux): require user public key plus TOTP using a PAM module. Example SSH config snippets—in /etc/ssh/sshd_config set ChallengeResponseAuthentication yes and AuthenticationMethods publickey,keyboard-interactive:pam. In /etc/pam.d/sshd add auth required pam_google_authenticator.so. This combination enforces both key-based authentication and a TOTP challenge. VPN and RDP: integrate your VPN/edge device with a RADIUS server that forwards to an MFA provider (Duo, Okta Verify, Azure MFA). For Windows RDP, put RD Gateway behind Azure AD or configure NPS + Azure MFA extension for multi-factor on domain logins.

Enrollment, recovery, and operational controls

User experience matters for adoption. Publish an enrollment playbook that covers supported authenticators (Authenticator app, FIDO2 keys, hardware tokens), enrollment steps with screenshots, and recovery flows (backup codes, helpdesk verification checklist). For helpdesk, implement a strict verification process (e.g., out-of-band confirmation, escalation, manager approval) and log every recovery event. Maintain a short-lived exception register for legacy systems and service accounts, explaining mitigation and a remediation timeline.

Validation steps and evidence for auditors

Auditors will want demonstrated enforcement and evidence. Prepare: (a) your MFA policy and exception register; (b) screenshots or exported policy definitions showing Conditional Access or enforcement rules; (c) enrollment reports showing percentage of users enrolled and any unenrolled users with documented exceptions; (d) authentication logs showing successful MFA events (date/time, user, source IP) for a sample period; (e) test plan and results showing that MFA blocks access when not completed using a test account. Practical validation: create a non-admin test account and attempt to access an FCI system without completing MFA—capture the failure and a successful login with MFA to demonstrate controls are active.

Small business real-world scenario

Example: a 12-person defense contractor using Microsoft 365 and a third-party VPN. Step 1: enable Security Defaults in Azure AD to quickly require MFA for interactive logins. Step 2: configure Duo for the VPN appliance via RADIUS; require Duo push for remote access. Step 3: enforce MFA for global admins and SharePoint sites that store FCI. Step 4: enroll users during a scheduled window, distribute hardware tokens to two executives, and provide backup codes. Evidence bundle for compliance: Security Defaults screenshot, Duo authentication report for the audit period, a user enrollment CSV, and a tested helpdesk recovery log.

Risks of not implementing MFA and best practices

Without MFA the organization is exposed to credential-stuffing, phishing, and lateral movement after a compromised password—risks particularly severe when handling FCI or working under federal contract. Noncompliance can result in contract penalties, lost business, and reputational damage. Best practices: avoid SMS as a primary factor (it's vulnerable to SIM swap), prefer phishing-resistant methods (FIDO2/WebAuthn) for privileged accounts, rotate and retire service account credentials, retain authentication logs for the period required by your contract or policy (commonly 90–365 days), and run annual verification exercises to ensure the enforcement remains effective.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.VI for MFA is an achievable, prioritized task for small businesses: inventory identities and access paths, choose enterprise-grade MFA methods, enforce via cloud conditional access or RADIUS-integrated MFA for on-prem systems, document enrollment and exceptions, and collect the logs and screenshots auditors require. A documented policy, demonstrable enforcement, and simple operational processes (enrollment + recovery + monitoring) will satisfy Compliance Framework expectations while materially reducing your cyber risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes