🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure VPN, MFA, and Endpoint Controls to Restrict External System Access — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Practical, step-by-step guidance for configuring VPNs, MFA, and endpoint posture checks to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III requirements.

March 28, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.III require organizations to restrict external access to systems processing government data — which in practice means combining a hardened VPN, strong multi-factor authentication (MFA), and endpoint controls (posture checks, EDR, encryption) so that only verified, compliant devices and users can access sensitive resources from outside your network.

Key objectives

The primary objectives for this control are: (1) ensure only authenticated and authorized external users can reach internal systems, (2) verify device posture before granting access, and (3) create auditable records of access attempts and actions. From a Compliance Framework perspective, you must demonstrate technical configuration (VPN and MFA settings), administrative policies (who can request remote access, enrollment practices), and operational evidence (logs, device inventory, posture failures and remediation).

Risks of not implementing these controls

Failing to implement VPN + MFA + endpoint controls exposes you to credential theft, lateral movement, and data exfiltration — especially dangerous for contractors handling Controlled Unclassified Information (CUI). Unprotected RDP/SSH portals and unmanaged remote endpoints are common attack vectors; without posture checks an attacker can use a compromised or out-of-date device to pivot into environments that store government data, resulting in contract loss, fines, and reputational damage.

Practical implementation — VPN configuration

Choose and configure the right VPN

Use a modern VPN solution that supports strong cryptography, client authentication, and integration with your identity provider. Options include WireGuard, OpenVPN Access Server, vendor cloud VPNs (AWS Client VPN, Azure VPN Gateway), or a SASE offering. Key configuration details: require TLS 1.2+/1.3; prefer ECDHE (P-256/P-384) for key exchange; use AES-256-GCM or ChaCha20-Poly1305; require client certificates AND user credentials (mutual TLS) where possible. Disable split tunneling for access to CUI systems — for OpenVPN use "redirect-gateway def1" or in WireGuard set AllowedIPs to 0.0.0.0/0 for routes you want forced through the tunnel. Limit admin interfaces to a management network and restrict VPN server access with firewall rules (e.g., allow UDP 51820 for WireGuard only from known IP ranges if applicable).

Practical implementation — Multi-factor authentication

Integrate MFA into the VPN and privileged access

MFA must be enforced at authentication points: VPN, cloud SSO, and any remote admin access (RDP, SSH). Use phishing-resistant methods (FIDO2/WebAuthn hardware tokens like YubiKey) for privileged accounts and staff with CUI access. For general users, push or TOTP (Authy, Google Authenticator, Microsoft Authenticator) is acceptable for Level 1. Architect MFA with a central identity provider (Azure AD, Okta, Duo) and use RADIUS / SAML or native integrations to plug into your VPN. For SSH, eliminate password logins and require key-based auth bound to a hardware token or an SSH CA; for RDP, require MFA bridging with an NPS/RADIUS agent. Avoid SMS-based OTPs for privileged users due to SIM swap risks.

Practical implementation — Endpoint controls and posture enforcement

Device hygiene, MDM, and network access control

Enforce endpoint controls via an MDM and posture check workflow before granting VPN access. Requirements should include full-disk encryption (BitLocker/FileVault), EDR presence and up-to-date definitions, OS patch level within a defined window (e.g., no more than 30 days behind), local firewall active, and no evidence of compromise. Implement NAC or conditional access: if posture fails, place the device in a remediations VLAN, deny access to CUI systems, and provide automated remediation steps (install agent, run updates). Use device certificates issued through an internal CA or SCEP for strong device identity, and ensure local admin rights are restricted; automate enrollment with Intune, Jamf, or your chosen MDM for consistent baseline policy enforcement.

Logging, evidence collection, and ongoing compliance

Document and retain logs to demonstrate compliance: authentication logs (who/when/from where), VPN connection metadata (device ID, posture checks), and EDR alerts. Forward logs to a central SIEM or log store (Splunk, Elastic, Azure Sentinel) and retain according to your contract/policy (common practice: 90 days for authentication events, longer for incident data). Maintain configuration snapshots of VPN and MFA policies (exported configs or screenshots), MDM policies, and evidence of enrollment/patch status for each device. Schedule periodic verification: review access lists quarterly, perform vulnerability scans monthly, and run tabletop incident response exercises annually.

Small-business example and checklist

Example: a 20-person small defense contractor. Implementation checklist: deploy Azure AD for identity, enable Conditional Access requiring MFA for all external sign-ins, use Azure VPN or OpenVPN with client certs + Azure AD RADIUS for the VPN, enroll devices in Intune with BitLocker and Defender for Business (EDR), and configure conditional access to allow VPN only from compliant devices. Keep an access spreadsheet mapping users to CUI roles, maintain a log retention policy, and create an emergency access account process (break-glass with hardware tokens, logged and reviewed). This configuration meets AC.L1-B.1.III by ensuring only authenticated users on compliant endpoints can access external systems hosting CUI.

Compliance tips and best practices

Operationalize compliance: automate posture checks and VPN provisioning, document change control for VPN/MFA configuration, and require proof of device enrollment before onboarding new users. Maintain at least two administrators with hardware token MFA for emergency access, rotate keys/certificates on a scheduled cadence (e.g., annually for certs), and disable legacy protocols (PAP, MS-CHAPv2) that weaken authentication. Conduct periodic audits and simulated phishing to ensure MFA enrollment and user awareness remain effective.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III requires a layered approach: a hardened VPN configured with modern ciphers and no split tunneling for sensitive traffic, strong MFA (preferably phishing-resistant for privileged accounts), and endpoint posture enforcement via MDM/EDR/NAC. For small businesses this can be achieved with a combination of cloud identity services, affordable EDR/MDM offerings, and strict logging/documentation practices that together form auditable evidence of compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes