🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure RBAC in Active Directory to Limit System Transactions — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II

Practical, step-by-step guidance to implement Role-Based Access Control (RBAC) in Active Directory to limit system transactions and meet FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.II requirements for small businesses.

March 28, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post walks through a practical Active Directory RBAC implementation to limit system transactions (changes to accounts, groups, services, and configuration) that helps small businesses meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.II requirements.

Why RBAC matters for this compliance requirement

The key objective of AC.L1-B.1.II is to ensure that only authorized individuals can perform specific system transactions (for example: creating users, resetting passwords, changing group membership, or modifying system settings). RBAC enforces least privilege by grouping permissions by role, simplifying audits, and reducing the risk of accidental or malicious changes that could expose Controlled Unclassified Information (CUI) or other sensitive data required under FAR/CMMC.

High-level implementation approach

Start with a small, repeatable process: (1) inventory transactions that must be restricted, (2) map transactions to business roles, (3) create security groups that represent those roles, (4) delegate only the required permissions to those groups at the OU/object level, (5) enforce technical controls (GPOs, LAPS, MFA, logging), and (6) audit and review access periodically. This structured approach aligns with Compliance Framework practices and makes it straightforward to produce evidence during an assessment.

Step 1 — Inventory and role design (practical)

For a small business (20–200 users) create a short access matrix listing system transactions and who needs them. Example rows: "Reset user password" (Helpdesk), "Create new user" (IT Admin), "Modify finance group membership" (HR or Finance Lead), "Install system updates" (Systems Admin). Keep roles minimal — for example: Helpdesk, IT Admin, Systems Admin, Application Owner. Store this matrix in your compliance documentation and link roles to AD groups.

Step 2 — Build role groups and OUs in AD (technical)

Use clear naming conventions in AD (e.g., CORP_Role_Helpdesk_Reset, CORP_Role_IT_Admin). For small shops the following PowerShell commands are safe and useful: New-ADGroup -Name "CORP_Role_Helpdesk_Reset" -GroupScope Global -GroupCategory Security -Path "OU=Groups,DC=corp,DC=example,DC=com" and Add-ADGroupMember -Identity "CORP_Role_Helpdesk_Reset" -Members "svc_helpdesk" ; Add individual staff to role groups, not vice versa. Create OUs that align with delegation boundaries (e.g., OU=Employees, OU=Servers, OU=Workstations) so you can scope permissions cleanly.

Step 3 — Delegate specific permissions (actionable)

Use the Delegation of Control Wizard in Active Directory Users and Computers (ADUC) to grant only the needed rights on the appropriate OU. For example, grant the Helpdesk role "Reset Password" and "Force Password Change at Next Logon" on OU=Employees, but do not grant "Modify Group Membership" or "Create/Delete User" unless required. For highly specific rights you can combine the Delegation Wizard with dsacls or programmatic ACL edits — but for clarity and auditability, prefer the Wizard for most small-business scenarios.

Technical controls to complement RBAC

Make these technical measures part of your RBAC implementation: enable LAPS for local admin password management; require separate, dedicated admin accounts for privileged tasks and block their regular use; enforce MFA on admin accounts; apply GPOs to limit interactive logons for role groups; and use Group Policy to restrict who can install software or change services. Example: create a GPO that only allows "CORP_Role_IT_Admin" the "Log on locally" right on IT admin workstations, then link the GPO to the OU containing those computers.

Logging, audit, and verification (practical commands)

Enable account-management auditing via Group Policy (Advanced Audit Policy -> Account Management) or use auditpol.exe: auditpol /set /subcategory:"User Account Management" /success:enable /failure:enable. Forward relevant security events (password resets, group changes, privilege assignments) to a central collector using Windows Event Forwarding or a SIEM, and retain logs per contract/organizational policy. Periodically run PowerShell queries such as Get-ADGroupMember and Get-ADPrincipalGroupMembership to verify membership against the documented access matrix.

Real-world small business scenario

Example: A small defense subcontractor has 40 users and must implement AC.L1-B.1.II. They create three role groups (Helpdesk_Reset, HR_GroupManager, IT_Admin). Using ADUC Delegation Wizard on OU=Employees they grant Helpdesk_Reset only the "Reset password" and "Read personal info" tasks. HR_GroupManager gets permission to modify the "Finance" security group only. IT_Admin members are the only ones in the built-in Administrators protected group, and they use a separate admin workstation with MFA and LAPS. Monthly reviews compare role group membership to HR records and produce evidence for auditors.

Risks if you do not implement RBAC to limit system transactions

Without RBAC you rely on individual discretion and ad hoc permissions, increasing risk of unauthorized changes, excessive privileges, insider threats, and accidental data exposure. Noncompliance risks include failing CMMC assessments, losing contracts subject to FAR 52.204-21, potential breach notification and remediation costs, and reputational harm. Operationally, lack of RBAC increases troubleshooting complexity and blast radius when an account is compromised.

Compliance tips and best practices

Document the access matrix and decisions; automate group membership where possible; maintain separation of duties (no single user should control all functions for a CUI workflow); implement periodic attestation (quarterly role reviews); keep privileged accounts offline until needed and use just-in-time elevation where possible (PIM/Azure AD for hybrid environments); and include RBAC configuration screenshots and policy references in your compliance package. Finally, test delegation changes in a staging OU before rolling them out in production.

In summary, implementing RBAC in Active Directory to limit system transactions for FAR 52.204-21 / CMMC 2.0 Level 1 is achievable for small businesses through a defined role design, clear AD group and OU boundaries, careful use of the Delegation of Control Wizard, supporting technical controls (LAPS, GPOs, MFA), and ongoing audit and review. Following the practical steps and controls described here will reduce risk, simplify audits, and help you produce the evidence assessors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes