🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement MFA, Device Certificates, and Conditional Access for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.18

Step-by-step guidance to implement multi-factor authentication, device certificates, and conditional access policies to satisfy NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AC.L2-3.1.18.

•
March 26, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Control AC.L2-3.1.18 (NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2) requires organizations to authenticate devices prior to allowing them access to organizational systems — in practice this means implementing device identity using certificates or equivalent device-trust signals, combining device assurance with strong user authentication (MFA), and enforcing access through conditional access policies.

Understanding the objective and real-world scope

The objective of AC.L2-3.1.18 within the Compliance Framework is to reduce risk from unmanaged or compromised endpoints by ensuring that only known, trusted devices can access Controlled Unclassified Information (CUI) and sensitive systems. For a small business this is typically accomplished by: issuing device certificates (machine or user+device), enrolling devices into an MDM (mobile device management) for compliance reporting, enabling MFA for user authentication, and gating access with conditional access policies that check both user and device posture.

Practical implementation steps (high level)

1) Inventory, policy design, and scope

Start with a small-scope pilot: inventory endpoints that access CUI (laptops, desktops, company phones, VPNs). Define which resources require device authentication — e.g., Office 365, VPN, internal web apps, and file servers. Document policies in your System Security Plan (SSP): what qualifies as a "managed device", minimum OS versions, required disk encryption and anti-malware, and acceptable compensating controls for legacy devices.

2) Choose PKI and provisioning method

Decide whether to run an internal PKI (AD CS + NDES) or use a managed PKI service (DigiCert, Venafi, Sectigo). For small businesses with limited staff, a managed PKI or a cloud CA (via Intune SCEP/PKCS profiles) is often faster. Technical recommendations: use ECC P-256 or RSA 2048/3072 keys, set certificate lifetimes to 1 year (automate renewals), enable OCSP stapling/CRL distribution, and create distinct certificate templates for machine and user authentication. For VPN and Wi‑Fi, configure client TLS certificates (802.1X) so network sessions are bound to device identity, not just a username/password.

3) Deploy MDM/endpoint enrollment and automation

Use an MDM (Microsoft Intune, Jamf for macOS, or an equivalent) to enforce device enrollment and to deploy certificate profiles. With Intune, enable automatic enrollment (Azure AD join or Hybrid Azure AD join for domain-joined devices) and configure SCEP/NDES or PKCS certificate profiles for automatic certificate issuance. Enable device compliance rules (disk encryption, password complexity, OS patch level). Configure certificate auto-renewal to avoid expired certificates breaking access — test renewals in your pilot group.

4) Configure Conditional Access and MFA

Create conditional access policies in your identity provider (Azure AD / Microsoft Entra ID, Okta, or similar). Example policy: target cloud apps (Exchange Online, SharePoint, VPN connector); require Grant controls = "Require multi-factor authentication" + "Require device to be marked as compliant or be hybrid Azure AD joined" (or "Require device to present a valid client certificate"). Also block legacy authentication protocols and require device compliance signals (MDM compliance, certificate presence). For MFA, prefer phishing-resistant methods: FIDO2/passkeys or hardware tokens (YubiKey, Windows Hello for Business) over SMS or voice.

Real-world small-business scenario

Example: a 50-employee engineering firm that handles CUI can implement a minimal compliant solution in phases: (1) Pilot 10 corporate laptops on Intune with Hybrid Azure AD Join and SCEP certificates via an on-prem AD CS + NDES; (2) Create a Conditional Access policy in Azure AD that requires devices to be compliant and users to pass MFA for access to Exchange Online and SharePoint; (3) Configure the VPN to accept only client certificate authentication and enroll the same machine certificates via Intune so only managed devices can establish VPN connections. This flow prevents contractors' personal laptops and stolen credentials from accessing CUI.

Risks of not implementing device authentication + MFA

Without device authentication and MFA, an organization faces substantial risk: adversaries can use stolen credentials from unmanaged endpoints to exfiltrate CUI, pivot laterally in the network, or impersonate users for social engineering. Non-implementation can also lead to failed CMMC audits, loss of DoD contracts, regulatory fines, and reputational damage. A single compromised admin or VPN credential accessed from an unmanaged device can produce high impact breaches.

Practical compliance tips and best practices

Build evidence for auditors: keep enrollment logs (MDM), certificate issuance and renewal logs (PKI), conditional access policy screenshots and evaluation logs, and sign-in logs showing device and MFA claims. Automate certificate lifecycle management to avoid expired certs. Use break-glass accounts with documented compensating controls and monitor them closely. For legacy devices where device-trust is impossible, apply network segmentation, just-in-time VPN access, additional monitoring, and require step-up authentication. Integrate telemetry into a SIEM for continuous compliance monitoring — capture device compliance state, certificate presence, and conditional access denials.

In summary, implementing AC.L2-3.1.18 requires planning, a PKI or managed certificate solution, MDM-driven device enrollment and compliance, strong MFA (preferably phishing-resistant), and conditional access policies that bind these signals before granting access to CUI — a phased pilot-first approach, automation of certificate lifecycle, and solid logging will make small-business compliance practical, sustainable, and auditable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes