🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Device and Network Controls to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III: Step-by-Step Guide

Practical, step-by-step guidance for small businesses to implement device and network controls that satisfy FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III requirements.

•
April 03, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide gives small businesses a practical, step-by-step approach to implementing device and network controls required by the Compliance Framework mapping of FAR 52.204-21 and CMMC 2.0 Level 1 Control AC.L1-B.1.III so you can protect government-related information, demonstrate compliance evidence, and reduce real-world risks.

Understanding the requirement and key objectives

The Compliance Framework requirement mapped to FAR 52.204-21 / CMMC 2.0 Level 1 AC.L1-B.1.III focuses on ensuring that devices and network paths that process, store, or transmit covered contractor information are controlled and secured. Key objectives are: maintain an authoritative device inventory, restrict and monitor device access to networks, enforce basic hardening and authentication controls, and document configuration and operational evidence suitable for contract compliance reviews.

Step-by-step implementation

1) Build and maintain an authoritative device inventory

Start by discovering all endpoints: desktops, laptops, mobile devices, printers, IoT, and servers. Use an automated inventory tool (MDM, RMM, or an endpoint management product) to collect hostname, MAC address, IP, OS version, installed agents, and last-checkin time. Example: for a 25-person subcontractor, deploy a cloud MDM (Microsoft Intune, JumpCloud, or a lightweight RMM) to enroll corporate laptops and require registration before granting access to contract data. Document the inventory in a spreadsheet or CMDB and export snapshots weekly for audit evidence.

2) Segment the network and enforce deny-by-default perimeter rules

Network segmentation isolates systems that handle covered information from general office devices and guests. Implement VLANs for 'Corp', 'Contractor-CUI', and 'Guest' and enforce inter-VLAN firewall rules on your edge device (UTM or cloud firewall). Example firewall rules: deny all inbound to VLAN 20 (Contractor-CUI) except management from a fixed admin IP; allow outbound only HTTPS (TCP 443) and DNS for required services; block SMB (TCP 445) between VLANs. A small business can achieve this with a managed firewall (e.g., Ubiquiti/UniFi, Meraki, Sophos) and label VLANs in diagrams kept with compliance artifacts.

3) Harden device baselines and enforce configuration controls

Create a baseline configuration for each device class: minimum OS patch level, disk encryption (BitLocker on Windows, FileVault on macOS), firewall enabled, anti-virus/EDR installed and reporting, and disabled unused services. Automate enforcement where possible: use Group Policy or MDM profiles to enforce password complexity, screen lock, and automatic updates. For example, require monthly patching cycles and emergency patching for high-risk vulnerabilities; record patch rollouts and include screenshots or agent logs as proof.

4) Control network access with authentication and NAC

Require authenticated network access using WPA2/WPA3-Enterprise for Wi-Fi and implement 802.1X or a simple NAC solution for wired ports where feasible. For small shops without RADIUS, segregate guest Wi-Fi and use strong PSKs on management networks. Require MFA for remote access (VPN) and admin portals—use certificate-based VPNs or modern client VPNs that verify device posture before granting access. Example posture checks: device enrolled in MDM, disk encryption active, EDR sensor present. Maintain a log of successful/failed authentications for compliance review.

5) Monitor, log, and maintain evidence for compliance

Enable centralized logging for firewall, VPN, and endpoint solutions. Configure logs to capture authentication events, device onboarding/offboarding, and administrative configuration changes. Retain logs long enough to support investigations—90 days is a common practical baseline for small businesses, though contract-specific requirements may vary. Use cloud SIEM-lite tools or even secure log exports (syslog to a separate server) and include a rotation/backup policy and examples of log queries/screenshots as artifacts for auditors.

Real-world small business scenario

Example: A 20-employee engineering subcontractor wins a contract expecting to handle contractor information. They enroll corporate laptops into Intune, enable BitLocker and Defender, create VLAN 10 for CUI servers and VLAN 20 for corporate workstations on a Ubiquiti Dream Machine, and enforce firewall rules that allow outbound HTTPS and block lateral SMB across VLANs. VPN access requires MFA and the VPN gateway checks device posture (Intune compliance) before allowing access. They store network diagrams, device inventory exports, and weekly patch reports in their compliance folder to prove implementation during contract reviews.

Risks of not implementing these controls

Failing to implement device and network controls increases the risk of data exfiltration, ransomware, lateral movement, and unauthorized access to government-related information. Consequences include contract termination, loss of future government work, potential civil penalties, and reputational damage. For small businesses, a single breach can be existential—both operationally and financially—so the controls above are practical mitigations with rapid ROI.

Compliance tips and best practices

Keep your controls simple, documented, and repeatable. Use automated tools to reduce manual error, maintain a change log for network and device configuration changes, and capture screenshots or exported reports as evidence. Prioritize: device inventory and segmentation first, then device hardening and MFA. Periodically test access controls (e.g., attempt to connect an unmanaged device) and run tabletop exercises for breach response. Finally, maintain a compliance checklist tied to each contract so auditors can quickly verify controls and evidence.

Summary: By building an authoritative device inventory, segmenting networks, hardening devices, enforcing authenticated access, and maintaining centralized logs and evidence, a small business can meet the practical expectations of FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.III—reducing risk and producing clear artifacts for compliance reviews. Implement these steps incrementally, document everything, and use off-the-shelf management tools to keep ongoing maintenance manageable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes