Multi-Factor Authentication (MFA) is a foundational control for meeting FAR 52.204-21 and CMMC 2.0 Level 1 identity requirements β this guide shows you, step-by-step, how a small business can plan, deploy, and sustain MFA across on-premises and cloud systems to authenticate identities in a way that is practical, auditable, and defensible for compliance assessments.
Why MFA is required and what Compliance Framework expects
FAR 52.204-21 requires basic safeguarding of contractor information systems and CMMC Level 1 includes controls for authenticating users (IA.L1-B.1.VI). Practically, that means your environment must use more than just passwords to prove a userβs identity before granting access to systems and covered data. The Compliance Framework expectation is demonstrable implementation: documented policies, enforced technical controls, enrollment and recovery procedures, and logged authentication events for review.
Step-by-step deployment guide
1) Prepare: scope, inventory, and policy
Start by scoping: list all systems that store or access Covered Contractor Information (CCI), contractor-controlled unclassified information, or any assets in scope for FAR/CMMC. Inventory accounts (local, AD, cloud), remote access methods (VPN, RDP, SSH), and SaaS apps (Office 365, Salesforce). Create a short MFA policy: who must use MFA (all users, privileged accounts, remote access), acceptable authenticators, enrollment rules, and exceptions process. Document retention and logging requirements and map them to your SIEM or log collection plan.
2) Choose MFA methods and architecture
Pick methods based on risk and feasibility: for small businesses, recommended approaches are (in order of preference) FIDO2/WebAuthn hardware tokens (YubiKey), platform authenticators (Windows Hello/Touch ID), and time-based OTP apps (TOTP via Google Authenticator or Microsoft Authenticator). Avoid SMS-based OTP for high-risk accounts because of SIM swapping. Decide whether to centralize authentication via an IdP (Azure AD, Okta, Google Workspace) for SSO and conditional access, or to integrate MFA per application (less desirable). For infrastructure (SSH, VPN), plan RADIUS or SAML/OIDC integrations with your IdP or use vendor-provided connectors (e.g., Duo for VPN/SSH).
3) Technical integrations and specific configurations
Implementations differ by platform; examples: enable Azure AD "Require MFA" in Conditional Access for all sign-ins to in-scope apps, disable legacy/basic auth in Exchange Online, and require "modern authentication." For Google Workspace, enforce 2-step verification and block less secure app access. For on-prem Active Directory, deploy Azure AD Connect and use Azure AD Conditional Access or deploy a RADIUS server with Duo Authentication Proxy for VPN and network appliances. Secure SSH by requiring certificate-based auth or integrating with a PAM module (libpam-pka, Duo Unix) to require MFA on server logins. For VPN appliances (Cisco ASA, Fortinet, Palo Alto), configure RADIUS to an MFA gateway. Configure enforcement to cover local admin accounts and emergency break-glass accounts β protect break-glass with hardware tokens stored securely and logged separately.
4) Pilot deployment and phased rollout
Run a pilot with a representative group (IT, leadership, remote workers) to test enrollment, helpdesk flow, and app compatibility. Track metrics: enrollment rate, failed logins, helpdesk tickets. Use phased enforcement: start by monitoring ("report-only") to discover issues, then enforce MFA for remote access and privileged accounts, then for all user logins. Provide clear user instructions for enrollment, register two authenticators per user (one primary, one backup), and issue hardware tokens to users who cannot use apps. Train helpdesk on verification and recovery procedures that conform to your policy (e.g., out-of-band identity verification before resetting MFA).
Small business examples and real-world scenarios
Example 1: A 25-person engineering firm uses Microsoft 365 and a site-to-site VPN. They deploy Azure AD, enable Conditional Access to require MFA for all cloud app access, integrate Duo for the VPN using RADIUS, and register platform authenticators and TOTP apps for users. Enrollment is done during a two-week window with a dedicated helpdesk hotline. Example 2: A subcontractor with an on-prem AD and SSH-accessible servers installs a PAM-based MFA solution for SSH, issues YubiKeys to executives and admins, and requires authenticator apps for other staff β documenting every step for the CMMC assessor.
Monitoring, logging, and maintenance
Logging is essential for compliance: collect authentication events (successful and failed) centrally in a SIEM (Splunk, Elastic, Azure Sentinel). Retain logs per contract requirements and your policy (commonly 1 year or as specified). Monitor for unusual patterns (multiple failed MFA attempts, new authenticator registrations) and configure alerting for high-risk events. Regularly audit enrolled authenticators, revoke lost device credentials immediately, and perform quarterly reviews of exception approvals. Keep software and firmware up to date for IdPs, VPNs, and MFA appliances to reduce vulnerabilities.
Risks of not implementing MFA and common pitfalls
Without MFA, a single compromised password can lead to data exfiltration, unauthorized system changes, loss of CUI, contract penalties, and reputational damage. Common pitfalls include: relying on SMS-only MFA, failing to protect emergency accounts, not covering legacy protocols (POP/IMAP/basic auth), and missing non-user access (service accounts) that must be secured via keys or certificates. Another frequent mistake is inadequate enrollment/recovery processes that either lock out users or allow weak social-engineering recovery.
In summary, implementing MFA to meet FAR 52.204-21 and CMMC 2.0 Level 1 controls is achievable for small businesses with a methodical approach: scope and policy first, choose phishing-resistant authenticators where possible, centralize authentication via an IdP, pilot and phase the rollout, instrument logging and alerting, and maintain documented procedures for enrollment and recovery. Taking these steps not only supports compliance but materially reduces the risk of credential compromise and unauthorized access.