🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Web Servers and CMS to Enforce FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV

Practical, step‑by‑step guidance for configuring web servers and CMS platforms to meet FAR 52.204-21 and CMMC 2.0 Level 1 access-control requirements (AC.L1-B.1.IV), including examples for small businesses.

April 20, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows practical, actionable steps to configure web servers and common CMS platforms so they enforce the access-control behaviors required by FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.IV), with real-world examples and checklists tailored to small businesses operating or hosting covered contractor information.

Compliance Framework specifics

Framework: Compliance Framework — Practice: Practice. Requirement: ensure that only authorized users and processes can access covered information systems and that access attempts are monitored and constrained to reduce credential‑based compromise. Key Objectives: limit unsuccessful login attempts, enforce unique user identification, apply least privilege, protect administrative interfaces, and produce auditable logs showing enforcement. Implementation Notes: apply controls at both the web server layer (Nginx/Apache/IIS) and CMS layer (WordPress/Drupal/Joomla), document configuration, and retain log evidence for audits.

How this maps to web servers

Start at the network and web server boundary: enforce TLS for management and user traffic (HSTS, TLS 1.2+), enable rate limiting for login endpoints, and block or throttle repeated failed attempts. For Nginx use limit_req/limit_conn directives; for Apache use mod_evasive and mod_security; for IIS use Dynamic IP Restrictions / Request Filtering. Example Nginx snippet to limit requests to a login endpoint:

limit_req_zone $binary_remote_addr zone=login:10m rate=2r/m;
server {
  location = /wp-login.php {
    limit_req zone=login burst=5 nodelay;
    include fastcgi_params;
    fastcgi_pass unix:/run/php/php8.1-fpm.sock;
  }
}

Combine server-level rate limiting with an OS-level blocklist like fail2ban (Linux) or Windows IP Security policies. Configure fail2ban with a jail tied to your web access log, for example:

[wordpress]
enabled = true
filter = wordpress
action = iptables-multiport[name=WordPress, port="http,https"]
logpath = /var/log/nginx/access.log
maxretry = 5
findtime = 600
bantime = 86400

On IIS, enable Dynamic IP Restrictions to block IPs with repeated 401/403 results and lock down remote administration to trusted IPs or VPN endpoints.

How this maps to CMS platforms

CMS-level controls are critical because web servers cannot see CMS authentication workflows fully. Apply unique user accounts, enforce strong password policies, reduce default administrative accounts, and implement account lockouts or rate limiting on the CMS side. For WordPress, recommended steps include: install a reputable login-limiting plugin (Limit Login Attempts Reloaded), a Web Application Firewall plugin (Wordfence), and a 2FA plugin if possible. In wp-config.php enforce secure cookies and admin HTTPS:

define('FORCE_SSL_ADMIN', true);
ini_set('session.cookie_secure', 1);
ini_set('session.cookie_httponly', 1);

For Drupal and Joomla, enable built-in throttle/lockout modules and require unique user IDs for all privileged accounts; remove or disable admin/anonymous shared accounts. For any CMS, disable XML-RPC or remote login APIs unless absolutely required and then protect them with stricter rate limits and IP whitelists.

Concrete technical controls and verification examples

File and process permissions: ensure web server process runs as a non‑privileged user (www-data, apache, or IIS_IUSRS) and that CMS writeable directories are limited (e.g., chmod 750 for uploads, chown www-data:www-data). Example commands:

chown -R www-data:www-data /var/www/example.com
find /var/www/example.com -type d -exec chmod 750 {} \;
find /var/www/example.com -type f -exec chmod 640 {} \;

Monitoring: configure web server access/error logs to capture username and authentication events when possible; forward logs to a central log collector or SIEM (Splunk/ELK/Graylog). For audit evidence, capture examples of blocked attempts: screenshots of fail2ban bans, log extracts showing repeated failed logins and successful ban actions, and configuration files with comments and timestamps. Validate controls by running a controlled test: simulate five failed login attempts from a test IP and show the resulting ban in iptables/fail2ban logs and CMS plugin logs.

Logging, monitoring, and audit evidence

Retention and availability of logs are audit focal points. Maintain centralized logs for at least the period required by your contract (commonly 90 days for Level 1), and ensure log integrity by restricting access and using forwarders. Evidence for FAR 52.204-21 / CMMC Level 1 should include: documented configuration baselines, change control records, screenshots of rate-limiting settings, sampled logs showing enforcement (failed attempts + ban entries), and a written incident response runbook describing how to react to a suspected brute-force or credential stuffing attack.

Risk of not implementing this control — small business scenario

A small engineering subcontractor hosts proposal documents on a WordPress site accessible to program staff. Without login rate limiting, an attacker executes a credential-stuffing campaign using leaked passwords and compromises a user account that has access to CUI. The result can be exfiltration of competitive data, termination of contracts, mandatory breach reporting, financial penalties, and reputational loss. For a small business, remediation costs (forensic investigation, notification, contract penalties) can exceed preventative measures like plugin licenses, a managed WAF, or short staff training.

Compliance tips and best practices

1) Baseline and document: maintain a documented baseline config for web servers and CMS (include version numbers and patch dates). 2) Least privilege: assign the minimum CMS roles and remove generic admin accounts. 3) Multi-layer controls: combine server rate limiting + fail2ban + CMS lockouts + 2FA for high-risk accounts. 4) Automated patching: subscribe to a tested update process for OS, web server, PHP/.NET, and CMS components. 5) Test regularly: schedule automated scans and periodic manual tests to validate lockouts and log collection. 6) Evidence folder: keep a compliance folder with config files, screenshots, log excerpts, and policy statements for audit requests.

In summary, meeting FAR 52.204-21 and CMMC 2.0 Level 1 requirements for AC.L1-B.1.IV is feasible for small businesses by combining web-server rate limiting, OS-level blocking (fail2ban/Dynamic IP Restrictions), CMS plugin-based login controls, secure configuration (TLS, secure cookies, file permissions), and centralized logging with documented test evidence. Implementing these layered controls, documenting them, and testing regularly will reduce the risk of unauthorized access and provide the audit artifacts needed to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes