🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Multi-Factor Authentication (MFA) for Users, Processes, and Devices: Step-by-Step for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - IA.L2-3.5.2

Step-by-step guide to implementing MFA for users, processes, and devices to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 Control IA.L2-3.5.2 with practical configs, examples, and compliance tips.

•
March 28, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Multi-Factor Authentication (MFA) is a core requirement of NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (IA.L2-3.5.2) for protecting Controlled Unclassified Information (CUI): implementing MFA for human users, non-human processes, and devices reduces credential theft, lateral movement, and unauthorized access to sensitive systems. This post gives a step-by-step, practical implementation plan tailored for small businesses that must meet Compliance Framework requirements, including specific technologies, configuration patterns, and real-world examples.

High-level implementation steps

Start with a repeatable project workflow: (1) inventory and classify accounts and devices, (2) define an MFA policy that covers users/processes/devices, (3) select vendor and methods (phishing-resistant where possible), (4) pilot with privileged and high-risk groups, (5) phased rollout and enforcement, and (6) continuous monitoring, auditing, and exception handling. Each step must be documented in your System Security Plan (SSP) and tracked as part of your compliance evidence.

Step 1 — Inventory and classification (users, processes, devices)

Inventory all accounts (human and service), network access points, and devices. For a small business (e.g., 30–50 staff), this often means exporting user lists from your IdP (Azure AD / Okta / Google Workspace), listing service accounts in Active Directory and automation servers (Jenkins, CI/CD runners), and enumerating endpoints enrolled with MDM. Classify accounts into categories: privileged (admins, operators), regular users (CUI access), service/process accounts (automation, APIs), and devices (corporate laptops, IoT, servers). This classification drives which MFA type and enforcement mechanism you apply.

Step 2 — Select MFA methods and architecture

Choose methods aligned with NIST guidance and CMMC expectations: strong, phishing-resistant options such as FIDO2/WebAuthn (hardware keys like YubiKey), certificate-based device authentication (EAP-TLS, machine certificates), and push or TOTP only where combined with additional controls. For processes and non-human accounts, prefer certificate-based auth, mutual TLS (mTLS), or short-lived OAuth 2.0 access tokens issued by an authorized identity provider. Architect with centralized identity (SSO/IdP) wherever possible so policies can be enforced centrally (Azure AD Conditional Access, Okta Policies, Google Context-Aware Access).

Step 3 — Implement MFA for human users

Start with privileged accounts: enable FIDO2 + platform authenticators for all admins, require hardware keys for privileged groups, and enable Conditional Access to require MFA for any access to CUI systems or from non-corporate networks. Example small-business implementation: use Azure AD P1/P2 or Okta to create a policy that targets groups "Domain Admins" and "CUI Users" and requires MFA + compliant device. For Microsoft environments, enable Windows Hello for Business backed by TPM or certificate for corporate laptops, and disable legacy protocols (NTLM, basic auth) that bypass MFA. Provide a fallback path (Azure AD password reset with MFA) and train users on enrolling authenticator apps and hardware tokens; log enrollment events for audit evidence.

Step 4 — Implement MFA for processes and service accounts

Do not leave automation or service accounts as long-lived static passwords. Replace static credentials with machine identities: X.509 certificates issued by your internal PKI (SCEP for device enrollment), mTLS between services, or short-lived tokens from a secrets manager (HashiCorp Vault, AWS STS, Azure Managed Identities). Example: replace a Jenkins job that uses a static API key with a Vault-issued short-lived token and configure the CI runner to authenticate using a machine certificate. For SSH access by automation, use certificate-based SSH (OpenSSH CA) plus forced command controls and logging; for APIs, require client certificate authentication instead of only API keys. Document the controls used for each service account in the SSP and demonstrate rotation and revocation procedures during assessment.

Step 5 — Implement MFA for devices and network access

Devices should be authenticated before granting access to CUI. Use MDM (Intune, Jamf, or Google endpoint management) to enroll devices, deploy device certificates, and enforce device compliance checks. On the network level, implement 802.1X (RADIUS + EAP-TLS) for wired/wifi to require machine certificates for access. For remote access, require VPN solutions to use SAML/OAuth with IdP-enforced MFA or implement a zero-trust approach with a cloud-based access proxy (ZTNA) that enforces device posture and MFA. A small business can configure Duo or Okta to add MFA to an existing OpenVPN or SonicWall VPN via RADIUS or SAML—document the configuration and log VPN MFA events for audit.

Monitoring, logging, exceptions and training

Enable and retain logs that show MFA enforcement: authentication events, enrollment, failures, exception approvals, and device posture results. Forward logs to a SIEM (Splunk, Elastic, or a cloud-native logger) and create alerts for repeated MFA failures, atypical device posture, or bypass events. Maintain an exceptions process: any request to exempt an account from MFA must be formally approved, time-boxed, and logged. Provide role-based training and run phishing-resistant testing: mandate hardware keys for admins and run mock-phishing campaigns to validate user behavior. The risk of not implementing MFA correctly includes credential compromise, lateral movement into CUI repositories, contract penalties, and loss of business — real-world breaches frequently start with a single compromised password.

Implementation checklist summary: inventory accounts/devices, choose phishing-resistant MFA methods for humans, replace static secrets for processes with certificates/short-lived tokens, enforce device authentication via MDM + device certs or 802.1X, pilot and roll out with documentation in your SSP, and enable continuous monitoring and an auditable exceptions process. By following these steps and using concrete controls (FIDO2, mTLS, Vault, Conditional Access, MDM, 802.1X), a small business can meet IA.L2-3.5.2 requirements while minimizing operational friction and reducing risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes