🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Step-by-Step Guide to Limiting System Access to Authorized Users, Processes, and Devices

Step-by-step, practical guidance for meeting FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I by limiting access to authorized users, processes, and devices using policies, technical controls, and monitoring.

•
April 10, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step implementation plan for FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I — limiting system access to authorized users, processes acting on behalf of users, and authorized devices — with concrete technical examples and small-business scenarios to help you meet Compliance Framework requirements.

Requirement and objectives

AC.L1-B.1.I requires that systems only be accessible by authorized users, processes (including services and scripts acting on behalf of users), and devices (including other systems). The Compliance Framework objective is to prevent unauthorized access to Controlled Unclassified Information (CUI) and other sensitive contractor information by enforcing authentication, authorization, and endpoint trust before granting access. Your implementation must cover policy, account lifecycle, device controls, and monitoring so auditors and assessors can verify you have effective access controls.

Step-by-step implementation

1) Inventory, policy, and role definitions

Start by inventorying systems that process or store CUI and map user roles and device types. Create an "Access Control Policy" that defines authorized user categories, approved devices (corporate-managed, BYOD rules), and allowed automated processes (service accounts, CI/CD runners). Require documented justification and approvals for access. For Compliance Framework evidence, capture a table of systems, the roles that need access, and the business case/approval trail for each access grant.

2) Account provisioning, least privilege, and deprovisioning

Implement a controlled provisioning workflow: request → approval → creation → verification → periodic recertification. Use role-based access control (RBAC) to assign minimal privileges necessary. Technical examples: in Active Directory/Azure AD, create groups for each role and assign permissions to the group rather than individuals; PowerShell sample to add user to group: Add-ADGroupMember -Identity "CUI-Users" -Members "alice". For Linux servers, create sudo groups (e.g., /etc/sudoers.d/cui-admins) and avoid adding users to wheel/root. Automate deprovisioning by integrating HR offboarding with your IAM (e.g., disable account immediately on termination, expire passwords with chage -E 0 username on Linux or Set-ADUser -Identity user -Enabled $false in AD). Maintain a log of provisioning/deprovisioning actions for audits.

3) Authenticate and verify devices and processes

Require multi-factor authentication (MFA) for any interactive access to CUI systems and enforce device compliance checks for remote access. For cloud environments, use Conditional Access/Conditional Identity policies (Azure AD Conditional Access: Require MFA and device compliance for assignments targeting "CUI apps"). For endpoints, deploy an MDM (e.g., Intune, Jamf, Google Endpoint Management) to ensure devices meet baseline security (disk encryption, patch level, PIN). For non-interactive processes, use scoped service accounts or token-based credentials with restricted permissions and short lifetimes (e.g., use short-lived OAuth tokens or vaulted secrets via HashiCorp Vault to avoid long-lived keys). For SSH-based access to Linux, disable password logins (PasswordAuthentication no in /etc/ssh/sshd_config) and restrict keys using AuthorizedPrincipalsCommand or forced-command in authorized_keys to limit what a key can do.

4) Network- and device-level enforcement

Enforce access restrictions at the network layer with segmentation and network access control (NAC). Place CUI systems on segmented VLANs or subnets and restrict access with ACLs and firewall rules so only authorized hosts and services can reach them. Implement host-based controls such as Windows Firewall rules or iptables/nftables to allow only required ports and source IPs. For remote access, use a hardened bastion host or VPN with device posture checks rather than exposing systems directly. Example: configure your VPN to require device compliance from MDM and MFA before assigning a session token that allows access to the CUI subnet.

5) Monitoring, logging, and periodic verification

Enable comprehensive logging to demonstrate access was authorized: authentication logs, access control list changes, service-account usage, and device compliance events. Use central log collection (e.g., Sysmon + ELK/Splunk, CloudTrail, Azure Monitor) and configure alerts for anomalous behavior (failed logins, new service-account usage, device non-compliance). Schedule quarterly access reviews where managers recertify who should retain access and review service accounts and device lists. Maintain a documented checklist for auditors showing evidence of reviews and corrective actions taken.

Real-world small-business scenarios

Example A — Small defense contractor (15 employees) using Microsoft 365 and two Linux servers: Enroll all corporate laptops in Intune, require BitLocker and a PIN, enable Azure AD Conditional Access to enforce MFA and Intune compliance for Microsoft apps and SSH access via a Windows-based bastion that authenticates to Linux using short-lived certificates from an internal CA. Use AD groups for role assignment and an offboarding automation script that disables AD accounts and removes group membership. Example B — Small software shop hosting code and CI/CD: restrict the CI runner's service account so it can only access repositories needed for builds, store runner tokens in Vault with TTLs, and use artifact repositories with fine-grained permissions; require developers to use MFA-enabled SSO for repository access and enforce branch-level protections to prevent unauthorized merges.

Risks, compliance tips, and best practices

Not implementing AC.L1-B.1.I increases risks: unauthorized disclosures of CUI, account compromise leading to lateral movement, contract termination, and regulatory penalties. Best practices: enforce least privilege, require MFA and device attestation for CUI access, automate provisioning/deprovisioning, rotate and avoid long-lived credentials, and maintain robust logging. Keep evidence organized: access policies, group membership snapshots, provisioning tickets, MDM compliance reports, and log extracts. For small businesses, leverage managed services (Azure AD, Intune, cloud IAM) to reduce operational burden while retaining configurability and auditability required by the Compliance Framework.

In summary, achieving compliance with FAR 52.204-21 / CMMC 2.0 AC.L1-B.1.I is a practical combination of policy, disciplined account lifecycle management, device trust enforcement, network segmentation, and monitoring. Start with an inventory and clear access policies, enforce them with RBAC, MFA, MDM/NAC, and vaulted credentials, and produce regular evidence through logs and access reviews — these steps will both reduce risk and produce the documentation auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes