🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Document Evidence and Demonstrate Compliance with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.IV: Templates and Implementation Tips

Practical guidance and ready-to-use templates to document evidence and prove compliance with FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.IV for small businesses.

•
March 31, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives small businesses a practical, step-by-step approach to documenting evidence and demonstrating compliance with FAR 52.204-21 and the mapped CMMC 2.0 Level 1 control AC.L1-B.1.IV under the Compliance Framework practice, including ready-to-use templates, file naming conventions, and concrete technical implementation tips you can apply immediately.

Practical implementation steps for Compliance Framework requirements

Start by scoping: identify systems that process or store Federal Contract Information (FCI) or other covered data, and create a system inventory that maps each system to the specific CMMC and FAR controls it must meet. For AC.L1-B.1.IV (an access control-related Level 1 control in the Compliance Framework context), implement the basic technical safeguards expected at Level 1 — account management, access reviews, session locks, and simple logging — and document each step. Your implementation plan should include owner names, timelines, tools, and minimal configuration settings (e.g., enable MFA for administrative accounts, enforce password complexity via Group Policy, enable session lock after 15 minutes on endpoints). Track all changes with a ticket or change-control identifier that will be referenced in evidence artifacts.

Technical controls and specific evidence items to collect

Collect a combination of configuration exports, logs, screenshots, and administrative records. For example: enable and export Windows Security Event logs (capture event IDs such as 4624 for logon and 4625 for logon failures), collect Linux /var/log/auth.log or auditd summaries for account actions, enable Office 365 unified audit log and export a CSV containing user sign-ins and mailbox access for the time window in question, and enable AWS CloudTrail or Azure Activity Logs with S3/Storage exports and retention set. Evidence artifacts should also include system configuration files (GPO export, /etc/ssh/sshd_config), change-control tickets showing who approved a configuration change, and screenshots of settings with visible timestamps. Maintain a signed policy or attestation that describes who is responsible for the control and the expected behavior.

Evidence log template and file naming conventions

Use a simple, consistent evidence log (spreadsheet or CSV) with at least these columns: ControlID, ArtifactID, DateCollected, Collector, ArtifactType (log/config/policy/screenshot), Description, FileName, StoragePath, RetentionUntil, and Verifier/ReviewDate. Example row: "AC.L1-B.1.IV | ART-20260331-01 | 2026-03-31 | A. Smith | access-review | Quarterly access review spreadsheet showing accounts | evidence/AC.L1-B.1.IV/access-review_q1_2026.xlsx | 2029-03-31 | J. Lee 2026-04-05". Adopt file naming like: evidence_{ControlID}_{artifact-short-desc}_{YYYYMMDD}.{ext} (e.g., evidence_AC.L1-B.1.IV_access-review_20260331.xlsx) and a folder structure such as /evidence/FAR52.204-21/AC.L1-B.1.IV/ to keep packages ready for inspection.

Real-world small business scenario

Consider a 15-person IT services firm bidding on a government contract. They use Microsoft 365, Azure AD, and a single AWS account for hosting. Implementation steps they took: (1) inventoryed 12 endpoints and three cloud services that could hold FCI; (2) enforced Azure AD MFA for all admin and contractor accounts and documented the enforcement policy via Conditional Access screenshots; (3) enabled Office 365 audit logging and exported a 90-day CSV of sign-in and mailbox access events; (4) ran a one-time access review and exported the results as a spreadsheet with manager approvals; (5) stored evidence in a versioned S3 bucket and an encrypted local backup. When assessed, they delivered an evidence index that crosswalked each AC.L1-B.1.IV expectation to specific files, timestamps, and a short narrative explaining how the artifact demonstrates compliance.

Compliance tips and best practices

Automate evidence collection wherever possible: subscribe to cloud audit exports, centralize logs with a SIEM or simple log aggregation (CloudWatch Logs, Security Center), and schedule quarterly access reviews. Assign a single compliance owner for each control and use a compact System Security Plan (SSP) template tailored to Level 1 that references your evidence artifacts. Keep evidence retention aligned with contract terms (a practical baseline: keep logs for at least 90 days and retain compliance artifacts for the life of the contract plus three years) and protect evidence integrity by storing read-only copies or using object versioning. For sensitive screenshots or logs, redact unrelated personal data before sharing with auditors.

Failing to implement and document this control increases risk significantly: you might fail contract audits, lose eligibility for future contracts, and — more importantly — you leave FCI exposed to unauthorized access or insider mishandling. In practice, lack of evidence is often treated the same as lack of control; even if you have mitigations in place, inability to show them typically results in noncompliance findings.

When preparing for a FAR or CMMC assessment, deliver an indexed evidence package: a short narrative for each control that explains what you did, a direct crosswalk table to artifacts, and a ZIP file or read-only share with all referenced artifacts. Include chain-of-custody notes where appropriate (who exported the log, command or GUI path used, and the checksum or object version), and be prepared to run a live demo or re-export logs if the assessor requests recent samples.

Summary: meet AC.L1-B.1.IV and FAR 52.204-21 requirements by scoping systems clearly, implementing basic access controls and logging, automating collection where possible, and maintaining a consistent evidence index and folder structure; use the templates and naming conventions described above, keep an assigned owner and retention policy, and prepare a concise narrative for assessors — these practical steps will make compliance demonstrable and repeatable for small businesses operating under the Compliance Framework.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes