🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Access Control Checklist to Verify and Control External System Use — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Step-by-step guidance to build an access-control checklist that verifies and controls use of external systems to meet FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III requirements.

April 11, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post shows a practical, audit-ready approach to creating an access control checklist that verifies and controls use of external systems in support of FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.III); it combines policy, technical controls, monitoring, and simple test steps so a small business can demonstrate compliance and reduce the risk of unauthorized data exposure.

Why you need verification and control of external systems

External systems—SaaS applications, vendor portals, unmanaged personal devices, cloud storage, and third-party APIs—are frequent vectors for inadvertent release of covered contractor information (CCI) or CUI. The compliance objective under the Compliance Framework is to ensure only authorized systems and users can access contractor information and that that access is verifiable. For a small business, failing to control this creates risks including data leakage to consumer cloud accounts, compromised vendor credentials, or malware ingress through unmanaged endpoints, which can lead to contract loss, financial penalties, and reputational damage.

Checklist foundation: inventory and classification

Start the checklist by requiring a verified inventory of external systems and how they touch contractor information. Checklist items should include: (a) current list of authorized external systems (name, vendor, purpose, data types accessed), (b) classification of data handled by each system (e.g., public, internal, CCI/CUI), and (c) documented owner and point of contact. Practical method: use Google Workspace/Azure logs, network flow records, and an employee survey to discover SaaS apps. Example for a small business: run a weekly SaaS shadow-IT discovery using DNS logs (e.g., OpenDNS/Cloudflare logs) and correlate to the inventory spreadsheet maintained in version control (date-stamped CSV or spreadsheet with change history).

Policy and contractual controls

Next, the checklist should verify existence and enforcement of Acceptable Use and Third-Party Access policies. Items: signed Acceptable Use policy for all employees, a vendor onboarding checklist requiring security controls (MFA, data segregation, incident notification), and flow-down contract language for subcontractors handling CCI/CUI. Example: require vendors to accept a Data Processing Addendum and provide proof of MFA and endpoint management prior to being granted access. For evidence, gather signed PDFs, vendor security questionnaires, and contract excerpts in a single evidence folder keyed to the checklist.

Technical controls to enforce and limit external access

Technical enforcement items are the heart of the checklist. Include: enforce MFA/2FA for all remote logins (examples: Azure AD conditional access policy requiring MFA; Google Workspace 2-step), restrict SaaS access to SSO-only (disable direct password logins), require device enrollment in an MDM (Microsoft Intune, Jamf) and mark devices as “compliant” before granting access, implement IP allowlists for privileged vendor access, and configure egress filtering/DNS filtering to block known risky cloud storage providers if not approved. Specific config examples: create an Azure AD Conditional Access policy with "Grant: require device to be marked as compliant" + "Require MFA"; in Google Workspace enable "Endpoint Verification" and disallow access for unenrolled devices.

Monitoring, logging, and verification steps

The checklist must define what to log and how to verify it. Required items: enable authentication logs (Azure AD sign-in logs, GCP/AWS CloudTrail), forward logs to a central store (SIEM or simple syslog/Cloud Storage), set retention policy (practical minimum: 90 days for user-auth events), and implement alerts for anomalous external access (new device, sign-in from atypical geolocation, or OAuth token grants to third-party apps). Verification steps: weekly review of sign-in anomalies, monthly review of OAuth app consent grants, and quarterly simulated access tests (create a controlled external account and attempt access to ensure restrictions work). For evidence, export sign-in reports and alert histories as PDFs dated to the audit quarter.

Testing, periodic audits, and operational controls

Include periodic verification and remediation requirements: quarterly access reviews (confirm each authorized system still needs access), monthly privileged account reviews, and an annual penetration test focused on external system integrations (SAML/SOAP endpoints, API keys, webhooks). Practical small-business example: schedule a quarterly “vendor access” review where the IT lead emails each vendor sponsor to confirm usage, disables access if there's no confirmation, and documents the response. The checklist should list test steps and expected outputs (e.g., "Attempt SSO to vendor portal from non-enrolled device — expected result: access denied; evidence: screenshot and timestamp").

Risk of not implementing the checklist

Without a formal checklist and verifiable controls, organizations face several clear risks: unauthorized copies of CCI/CUI being stored in unmanaged consumer clouds; compromised vendor credentials leading to lateral movement; regulatory noncompliance and contract termination; and insufficient forensic data to respond to incidents. For a small business, one leaked file or an exfiltration incident can mean immediate disqualification from government contracts and substantial remediation costs. The checklist both reduces these risks and creates the evidence trail needed to demonstrate due care to auditors and contracting officers.

Summary: build your access control checklist around a discover-classify-enforce-verify cycle: maintain an up-to-date inventory, require documented policies and contractual protections, apply concrete technical controls (SSO, MFA, MDM, egress/DNS filters, IP allowlists), log and monitor access events, and perform regular verification and remediation. For small businesses pursuing or maintaining FAR 52.204-21 and CMMC Level 1 compliance, this pragmatic checklist approach provides clear, testable items and evidence collection steps so you can both reduce risk and demonstrate compliance during audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes