Multi-factor authentication (MFA) is a foundational control for protecting federal contract information (FCI) and satisfying FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.VI; this post gives Compliance Framework–specific, hands-on steps to deploy MFA, integrate it with cloud and on-prem access, and collect the evidence auditors will want to see.
What the control expects and how to scope your rollout
The Compliance Framework requires reasonable safeguarding for systems that store or process FCI. For practical implementation, treat MFA as mandatory for: privileged accounts (administrators), remote access methods (VPN, RDP, SSH), contractor/vendor access, and any user accounts that access FCI or can access systems that do. Start by scoping your environment: inventory identity stores (Azure AD, Google Workspace, AD on-prem), remote access appliances (VPN, RD Web, Citrix), and service accounts that currently bypass interactive login.
Implementation steps (high-level, vendor-agnostic)
Follow these phased steps: (1) identify and classify accounts that need MFA; (2) choose supported MFA methods appropriate to risk (authenticator apps, hardware FIDO2 keys, enterprise MFA providers); (3) configure enforcement (conditional access policies, VPN RADIUS with MFA, per-user enforcement as needed); (4) enroll users and document exceptions; (5) log, monitor, and validate the configuration; (6) maintain policies and periodic revalidation. For small organizations, documenting a simple policy that lists who must use MFA and how exceptions are approved satisfies auditors as long as enforcement and evidence are present.
Concrete technical configurations — cloud examples
Azure/Microsoft 365: For many small businesses using Microsoft 365 Business or Entra ID, start with Security Defaults (turn on quickly) or, for richer control, use Conditional Access (Azure AD P1). At minimum enforce MFA for Global Administrators and for sign-ins to apps that access FCI. Google Workspace: enable 2‑Step Verification enforcement in the Admin console and set a 2‑step enforcement date, require Security Keys (FIDO) for admins if possible. AWS: enable MFA for the root account (hardware or virtual), require MFA for IAM users with console access, and enforce MFA in IAM policies or with SCPs where applicable.
Concrete technical configurations — on-premises and remote access
SSH (Linux): require user public key plus TOTP using a PAM module. Example SSH config snippets—in /etc/ssh/sshd_config set ChallengeResponseAuthentication yes and AuthenticationMethods publickey,keyboard-interactive:pam. In /etc/pam.d/sshd add auth required pam_google_authenticator.so. This combination enforces both key-based authentication and a TOTP challenge. VPN and RDP: integrate your VPN/edge device with a RADIUS server that forwards to an MFA provider (Duo, Okta Verify, Azure MFA). For Windows RDP, put RD Gateway behind Azure AD or configure NPS + Azure MFA extension for multi-factor on domain logins.
Enrollment, recovery, and operational controls
User experience matters for adoption. Publish an enrollment playbook that covers supported authenticators (Authenticator app, FIDO2 keys, hardware tokens), enrollment steps with screenshots, and recovery flows (backup codes, helpdesk verification checklist). For helpdesk, implement a strict verification process (e.g., out-of-band confirmation, escalation, manager approval) and log every recovery event. Maintain a short-lived exception register for legacy systems and service accounts, explaining mitigation and a remediation timeline.
Validation steps and evidence for auditors
Auditors will want demonstrated enforcement and evidence. Prepare: (a) your MFA policy and exception register; (b) screenshots or exported policy definitions showing Conditional Access or enforcement rules; (c) enrollment reports showing percentage of users enrolled and any unenrolled users with documented exceptions; (d) authentication logs showing successful MFA events (date/time, user, source IP) for a sample period; (e) test plan and results showing that MFA blocks access when not completed using a test account. Practical validation: create a non-admin test account and attempt to access an FCI system without completing MFA—capture the failure and a successful login with MFA to demonstrate controls are active.
Small business real-world scenario
Example: a 12-person defense contractor using Microsoft 365 and a third-party VPN. Step 1: enable Security Defaults in Azure AD to quickly require MFA for interactive logins. Step 2: configure Duo for the VPN appliance via RADIUS; require Duo push for remote access. Step 3: enforce MFA for global admins and SharePoint sites that store FCI. Step 4: enroll users during a scheduled window, distribute hardware tokens to two executives, and provide backup codes. Evidence bundle for compliance: Security Defaults screenshot, Duo authentication report for the audit period, a user enrollment CSV, and a tested helpdesk recovery log.
Risks of not implementing MFA and best practices
Without MFA the organization is exposed to credential-stuffing, phishing, and lateral movement after a compromised password—risks particularly severe when handling FCI or working under federal contract. Noncompliance can result in contract penalties, lost business, and reputational damage. Best practices: avoid SMS as a primary factor (it's vulnerable to SIM swap), prefer phishing-resistant methods (FIDO2/WebAuthn) for privileged accounts, rotate and retire service account credentials, retain authentication logs for the period required by your contract or policy (commonly 90–365 days), and run annual verification exercises to ensure the enforcement remains effective.
In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.VI for MFA is an achievable, prioritized task for small businesses: inventory identities and access paths, choose enterprise-grade MFA methods, enforce via cloud conditional access or RADIUS-integrated MFA for on-prem systems, document enrollment and exceptions, and collect the logs and screenshots auditors require. A documented policy, demonstrable enforcement, and simple operational processes (enrollment + recovery + monitoring) will satisfy Compliance Framework expectations while materially reducing your cyber risk.