🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III: Step-by-step guide to verify and limit connections to external information systems

Practical, step-by-step guidance for small businesses to verify and limit connections to external information systems to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements.

•
April 16, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step implementation plan to satisfy FAR 52.204-21 (basic safeguarding of contractor information systems) and CMMC 2.0 Level 1 practice AC.L1-B.1.III — verifying and limiting connections to external information systems — with specific controls, examples, and evidence you can apply in a small business environment.

Understanding the requirement

AC.L1-B.1.III / FAR 52.204-21 requires organizations to ensure that systems processing Federal Contract Information (FCI) only connect to approved external information systems and that those connections are verified and limited. In practical terms this means: (1) identify which external systems your network talks to, (2) justify/approve those connections, (3) technically restrict connections to only what is approved, and (4) maintain records and monitoring to demonstrate ongoing compliance.

Step-by-step implementation

1) Inventory and classify external connections

Start with discovery: capture an inventory of all hosts, services, and outbound connections associated with systems that handle FCI. Tools and commands to use: on endpoints run `netstat -tunap` or `ss -tunap` and `lsof -i` to see active connections; on servers check application configs (e.g., /etc/hosts, app config files). On the network side ingest firewall logs, proxy logs, and VPC Flow Logs (AWS) or NSG Flow Logs (Azure) for a 30–90 day window to build a baseline. Create a spreadsheet or CMDB entry for each external endpoint with fields: hostname/IP, purpose, data type exchanged, owner, contract/vendor, TLS required, and approval status.

2) Define policy, acceptance criteria, and an exceptions process

Draft a "Verified External Connections" policy that codifies what can connect to external systems: e.g., only vendor-managed SaaS endpoints required for business, approved IP/CIDR ranges, and authenticated access via VPN or client certs. Include acceptance criteria: mandatory TLS 1.2+, vendor security attestation, contractual data handling terms, and requirement for static IPs or VPN tunnels for remote admins. Establish a documented exception process with defined approvers, risk acceptance, and review cadence (e.g., 90 days for temporary exceptions).

3) Enforce with technical controls

Apply "default deny" egress and ingress controls and an allowlist approach. Examples: - Perimeter firewall: set egress rules to deny all outbound traffic except approved destinations/ports. Example iptables snippet for an app server that only needs outbound HTTPS to 203.0.113.5: `iptables -P OUTPUT DROP` then `iptables -A OUTPUT -p tcp -d 203.0.113.5 --dport 443 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT`. - Windows: `netsh advfirewall firewall add rule name="AllowOutbound443ToVendor" dir=out action=allow remoteip=203.0.113.5 protocol=TCP remoteport=443`. - UFW example: `ufw default deny outgoing` then `ufw allow out from any to 198.51.100.0/24 port 443 proto tcp`. - Cloud: restrict egress in AWS Security Groups and Network ACLs; enable VPC Flow Logs and restrict outbound CIDRs to vendor IPs or private peering. In Azure use NSGs with deny rules and Application Gateway/WAF for web traffic. - For remote vendor/admin access, require a jump host (bastion) inside your network and a VPN with MFA, or implement per-vendor VPN tunnels with IPsec; avoid direct RDP/SSH from public internet.

4) Verify and monitor continuously

Verification is both initial and ongoing. Perform active tests: periodic port scans (nmap) from a controlled host to confirm blocked services: `nmap -Pn -p 1-65535 `; use `ss`/`netstat` on servers to detect unexpected outbound sessions. Enable centralized logging (syslog, Windows Event Forwarding) and ingest to a SIEM or log store. Monitor for anomalies with alerts for unknown destination IPs, unusual port use, or spikes in outbound connections. In cloud environments use VPC Flow Logs + Athena/CloudWatch or Azure Monitor to run queries that surface unknown external endpoints. Retain logs that demonstrate blocking decisions and alerts for the required retention period (document retention per contract).</p>

5) Operationalize for a small business

Small businesses often lack dedicated network teams — use managed services and built-in cloud controls: enable managed firewall services (AWS Firewall Manager, Azure Firewall), use a secure web gateway / CASB for SaaS allowlisting (Cisco Umbrella, Zscaler), and consider an MSSP for 24/7 monitoring. Keep the implementation simple and auditable: maintain a single authoritative inventory, use templates for firewall/security group rules, and automate rule deployment with IaC (Terraform/ARM/CloudFormation) so configuration snapshots serve as evidence. Schedule monthly reviews and quarterly attestation meetings with vendors to confirm continued approval of their endpoints.

Risks of not implementing the requirement

Failing to verify and limit connections exposes FCI to data leakage, supply-chain compromise, lateral movement from a compromised external service, and malware exfiltration. Non-compliance risks contract penalties, loss of federal contracts, and reputational harm. For small businesses, a single misconfigured egress rule or open remote access port can lead to a breach that jeopardizes both the contract and business survival.

Compliance evidence you should collect: network diagrams with approved external endpoints annotated, firewall/security group rule exports (timestamped), configuration management commits (IaC templates), logs showing blocked connection attempts and approved successful connections, exception approvals, vendor security attestations, and periodic verification scan results. Make these part of your audit pack and retention policy.

Summary: Implementing AC.L1-B.1.III means inventorying and classifying external connections, codifying policies and exceptions, enforcing allowlist-based network controls (firewalls, cloud NSGs, VPN/jump hosts), continuously verifying via logs and scans, and operationalizing controls affordably for small businesses through managed services and automation. Doing this reduces risk, creates clear audit evidence, and helps you meet FAR 52.204-21 and CMMC 2.0 Level 1 obligations without overwhelming your team.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes