🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Physical Access Control Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.VIII Compliance

Practical, step-by-step guidance to build a physical access control checklist that helps small businesses meet FAR 52.204-21 and CMMC 2.0 Level 1 (PE.L1-B.1.VIII) requirements.

•
March 25, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, action-oriented playbook to build a physical access control checklist aligned with FAR 52.204-21 and CMMC 2.0 Level 1 control PE.L1-B.1.VIII — focused on what a small business must do, how to document it, and affordable technical choices to reduce risk while producing auditable evidence.

Understanding FAR 52.204-21 and CMMC PE.L1-B.1.VIII

Both FAR 52.204-21 (Basic Safeguarding of Covered Contractor Information Systems) and CMMC 2.0 Level 1 require safeguarding federal contract information (FCI) and limiting physical access to systems and areas that store, process, or transmit FCI. Control PE.L1-B.1.V.III (PE.L1-B.1.VIII as presented) is a practical directive to prevent unauthorized physical access to information systems and the media that contain FCI — this means doors, server closets, shared desks, removable media, and exportable hard drives must be controlled, monitored, and logged.

How to structure your implementation

Start with scope: identify spaces and assets that handle FCI (workstations, servers, printers, network closets). Create a short policy that states who is authorized, what controls are used (locks, badges, escorting visitors), and how access events are logged and reviewed. The checklist should align to four phases: Identify, Protect (controls), Monitor & Test, and Document & Report — mapping directly to common compliance frameworks and providing evidence for audits.

Physical Access Control Checklist (practical items)

  • Asset & space inventory — list rooms, closets, and devices that handle FCI (include model/serial number, location, and owner).
  • Authorization list — maintain an up-to-date roster of authorized personnel for each secured area (name, role, access level, provisioning/deprovisioning date).
  • Access control method — define and implement door locks (mechanical, keyed, keypad, electronic badge), specifying fail-secure vs fail-safe behavior and power/backup needs.
  • Logging & retention — ensure access system logs include user ID, door ID, timestamp, action (grant/deny), and reason (if applicable); retain logs at least 90–180 days (recommend 180 days for stronger evidence).
  • Visitor handling — visitor sign-in, photo ID check, temporary badges, escorts, and a policy for visitors to sensitive areas (no unsupervised access to FCI areas).
  • Deprovisioning process — documented steps for immediate removal of access for terminated/changed personnel, including badge revocation and changing shared PINs.
  • Surveillance and detection — camera placement to cover entrances and server closets (with date/time stamps), and integration with access logs where possible.
  • Maintenance & testing schedule — periodic (quarterly) checks of locks, badge readers, camera health, and monthly review of access log anomalies.
  • Media handling — secure storage for removable media, labeled media destruction process (shredding or crypto-erase), and rules for removing devices from the facility.
  • Evidence and documentation — photos of controls, exported access logs, change history for authorization lists, and receipts for purchased devices.

Example (small business scenario): a 12-person consultancy with a single server rack in a locked closet. Implementation can be simple: replace swing-door keyed lock with an electronic keypad or low-cost RFID reader, maintain a spreadsheet of authorized badge IDs, mount a single camera to record the closet door, and export daily access logs weekly to a secure folder. Deprovisioning: HR emails IT when someone leaves; IT revokes badge via the cloud ACS interface within 1 hour and archives the event log.

Technical details to implement correctly

Choose access control systems (ACS) that support unique credentials (no shared generic accounts), strong timekeeping (NTP-synced timestamps), and log export (CSV or syslog). Ensure communications between readers/controllers and the management console use encrypted channels (TLS 1.2+). For critical doors, require two-factor physical access (badge + PIN) where possible. Provide UPS power to controllers and electric strikes or maglocks to maintain access during short outages, and define emergency egress behavior consistent with life-safety codes.

Integrate ACS logs with an audit process: configure automatic daily exports retained in a tamper-evident location (write-once or versioned cloud storage). Ensure log fields include user ID, credential type, door/device ID, event type (grant/deny), and the controller serial number. If you have a SIEM or log aggregator, forward syslog with TLS to centralize review and alerting for repeated denied attempts or access outside work hours.

Operational controls matter as much as hardware: define who escorts visitors, require photo ID checks, enforce a clean-desk policy to avoid leaving FCI on open desks, and use locked storage for media. Create a deprovisioning checklist executed on termination or role change (revoke badge, collect keys, change shared PINs, reassign system accounts). Schedule quarterly access reviews where managers confirm the current authorization list and sign off on changes.

Risks of not implementing these controls include unauthorized disclosure of FCI, theft of devices, contract loss, civil penalties, and reputational damage. For example, an unlocked server closet could allow a malicious insider or intruder to clone hard drives containing sensitive contract information — resulting in immediate breach reporting obligations and potential disqualification from future federal work.

Compliance tips, evidence collection, and best practices

Prioritize documentation: the auditor cares about evidence — policies, the authorization roster, exported logs, photos of locked areas, and records showing deprovisioning actions. Use change control for physical access changes (a ticketing system entry to add/remove personnel) and attach screenshots or export files to the ticket. For small budgets, consider cloud-managed ACS vendors that provide easy revocation, logging, and automated exports; for higher security, use on-prem controllers with encrypted channels and local log retention plus off-site backups.

Finally, test your controls: run table-top exercises simulating an employee termination, a lost badge, or a late-night unauthorized access attempt. Verify that the deprovisioning workflow completes in your target SLA (e.g., within 1 hour), and that logs show the expected events. These tests are strong audit evidence and reduce the chance of a real incident.

Summary: Build your checklist by scoping assets, selecting appropriate physical controls (locks, badges, cameras), implementing robust logging and deprovisioning, and maintaining documented evidence and periodic reviews — practical steps that small businesses can implement economically to meet FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.VIII requirements while materially reducing the risk of FCI exposure.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes