🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Compliance Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X: Tools, Tests, and Evidence to Pass an Audit

Step-by-step guidance to build a practical compliance checklist for FAR 52.204-21 and CMMC 2.0 Level 1 Control SC.L1-B.1.X, with tools, tests, and evidence examples for auditors.

•
April 14, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204-21 and the corresponding CMMC 2.0 Level 1 control labeled SC.L1-B.1.X requires a practical, evidence-focused approach—this post shows how to design a Compliance Framework checklist with concrete tools, repeatable tests, and the exact evidence an auditor will expect so a small business can pass an inspection with confidence.

Understand the control and map objectives

Start by documenting the control text (or your organization's interpretation if the control is provided as a placeholder like "SC.L1-B.1.X"), the key objectives (for example: protect system boundaries, ensure encryption-in-transit, or limit communications to authorized endpoints), and how that maps to FAR 52.204-21 basic safeguarding requirements. In your Compliance Framework you should list: control ID, short objective, owner, scope (systems and data classified as covered contractor information or CUI), and acceptance criteria (e.g., "TLS 1.2+ enforced for all web services; port 23 disabled on all hosts; firewall rules only allow approved IP ranges"). This mapping is essential for consistent testing and audit traceability.

Build a step-by-step checklist (implementation notes)

Create checklist entries that are actionable and testable. For each checklist item include: (1) a short requirement statement, (2) implementation notes (configuration file locations, policy names), (3) test scripts or commands, (4) expected results, (5) evidence artifacts, (6) frequency (one-time, daily, monthly), and (7) responsible party. Example entries: "Enforce TLS 1.2+ on public web services" with implementation notes pointing to your load balancer config or Azure Application Gateway, a test using curl --tlsv1.2 or testssl.sh, expected result "TLS 1.2 or higher negotiated," and evidence "testssl-report-YYYYMMDD.html and load-balancer-config.json".

Tools and technical tests to validate implementation

Choose a mix of automated and manual tools that suit small business budgets. Useful tools include: nmap or masscan for port discovery (nmap -sT -Pn -p- target), testssl.sh or SSL Labs for TLS validation, netstat/ss and process lists for local socket checks, Windows netsh advfirewall firewall show rule name=all for Windows firewall rules, iptables -L or nft list ruleset for Linux hosts, and cloud provider CLIs (az network watcher, aws ec2 describe-security-groups) for cloud networking. For log and configuration evidence, use: SIEM search queries (Splunk: index=syslogs sourcetype=firewall action=deny | stats count by src_ip), or scheduled cron jobs that run scripts to snapshot configurations (e.g., /usr/local/bin/dump-firewall.sh -> /var/backups/fw-YYYYMMDD.cfg). Where possible automate tests and collect reports to reduce manual work before audits.

Evidence types auditors expect (and how to collect them)

Auditors expect reproducible artifacts, not verbal assurances. Collect: configuration files (firewall ACLs, proxy config, load-balancer TLS settings), scheduled-scan reports (nmap/testssl), screenshots of cloud console policies with timestamps, change control tickets showing when a setting was applied, user access lists, MFA enablement proof, and log snippets with correlated timestamps. Name artifacts consistently (e.g., SC.L1-B.1.X-fw-acl-20260401.json, SC.L1-B.1.X-tls-test-20260401.html). Maintain a read-only evidence repository (S3 bucket with versioning or a SharePoint document library) and document retention policies mapped to your Compliance Framework.

Real-world small business scenarios and examples

Scenario A: A 12-person contractor uses Microsoft 365 and Azure AD. Checklist items: ensure TLS for all Office 365 connections (vendor-managed but verify with testssl), enforce Azure AD Conditional Access to require MFA for all logins, and use Intune to enforce device encryption. Evidence: Conditional Access policy export, MFA user status CSV, Intune device compliance report, and a signed statement of configuration from the MSP if an external admin manages settings. Scenario B: A small on-prem shop with a single firewall and NAS containing CUI. Checklist: document firewall rules, restrict management interfaces to a management VLAN, disable insecure protocols (Telnet/FTP), run weekly vuln scans of the NAS and capture results. Evidence: firewall config export, VLAN diagram, scan reports, and change ticket referencing the DISABLE-TELNET change.

Compliance tips and best practices

Keep the checklist lean and focused on auditable facts. Use templates for evidence filenames and an index spreadsheet mapping controls to evidence artifacts. Automate recurring tests and retain their output for at least the retention period required by your Compliance Framework or contract. Use version control (Git or internal CMDB) for configuration files so you can show historical changes. Document exceptions with a POA&M (Plan of Action & Milestones) and a compensating control; auditors will accept an exception if it is tracked, mitigated, and scheduled for resolution. Train a designated "audit liaison" who knows where evidence lives and how to run the tests on short notice.

Risks of not implementing SC.L1-B.1.X correctly

Failure to implement and document this control risks exposing CUI through misconfigured communications and system boundaries, results in audit findings that can delay contract award or lead to contract termination, and increases the chance of a breach with regulatory and reputational consequences. For small businesses, a single finding can translate to loss of eligibility for DoD contracts. Operationally, lack of documented evidence makes every audit slow, expensive, and stressful.

Summary

To pass an audit for FAR 52.204-21 / CMMC 2.0 Level 1 control SC.L1-B.1.X, build a Compliance Framework-aligned checklist that maps objectives to specific, testable items; use affordable tools (nmap, testssl.sh, cloud CLIs, SIEM queries); automate and name evidence consistently; and keep configuration snapshots, change tickets, and scan reports readily available. For small businesses the key is pragmatic documentation, repeatable tests, and a small set of standardized evidence artifacts so audits become predictable and manageable rather than disruptive.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes