🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Implement Network Segmentation and Access Controls for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.X: A Small Business Guide

Step-by-step guide for small businesses to implement practical network segmentation and access controls to meet FAR 52.204-21 and CMMC 2.0 Level 1 (SC.L1-B.1.X) requirements.

β€’
March 26, 2026
β€’
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This guide explains, in plain and actionable terms, how a small business can implement network segmentation and access controls to satisfy FAR 52.204-21 basic safeguarding obligations and the CMMC 2.0 Level 1 practice SC.L1-B.1.X within the Compliance Framework β€” including step-by-step tasks, technical examples, documentation requirements, and the risks you face if you don’t act.

Why segmentation and access control matter for Compliance Framework

FAR 52.204-21 requires contractors to safeguard covered information; CMMC 2.0 Level 1 (and practice SC.L1-B.1.X) implements basic cyber hygiene such as limiting access to Federal Contract Information (FCI) and Controlled Unclassified Information (CUI). Network segmentation and access controls reduce the attack surface by isolating systems that process or store sensitive information, enforcing least privilege, and producing auditable enforcement points β€” all of which are concrete, testable requirements during a compliance assessment.

Practical, step-by-step implementation (small-business friendly)

Start by mapping your environment and classifying data flows. Inventory servers, endpoints, cloud services, and where FCI/CUI is created, stored, or transmitted. Create a simple data-flow diagram showing which devices talk to which systems and mark any systems that handle CUI. This inventory is the foundation of your Compliance Framework evidence: network diagrams, asset lists, and data classification records.

Next, implement logical segmentation using VLANs/subnets and firewall rules. A minimal, effective segmentation plan for a small office might be: VLAN 10 (Users) β€” 192.168.10.0/24, VLAN 20 (CUI/Workstations) β€” 192.168.20.0/24, VLAN 99 (Guest/IoT) β€” 192.168.99.0/24, and a DMZ for public-facing services. Apply router/firewall ACLs to block inter-VLAN traffic by default and explicitly allow only required flows (for example, user workstations to an approved file server on port 445 or to a cloud service on 443). Use role-based access control (RBAC) and group membership to limit who can access systems in the CUI VLAN.

Device- and user-level controls

Complement network controls with host-based protections: enable Windows Firewall or a host-based firewall on macOS/Linux and create rules that only permit management and required services from jump hosts or specific admin subnets. Enforce MFA for remote access (VPN, RDP via a jump host). Where possible use Network Access Control (802.1X or posture checks via NAC) to ensure only managed, patched devices join VLANs that contain CUI systems. For cloud-hosted resources, use security groups and VPC subnet separation to mirror your on-prem segmentation.

Technical examples you can apply today

Example ACLs and rules for a simple small-business edge router/firewall:

# Block full user-to-CUI traffic
iptables -I FORWARD -s 192.168.10.0/24 -d 192.168.20.0/24 -j DROP
# Allow HTTPS from users to approved CUI-host (192.168.20.5)
iptables -I FORWARD -s 192.168.10.0/24 -d 192.168.20.5 -p tcp --dport 443 -j ACCEPT
# Allow admins from 192.168.10.10 only
iptables -I FORWARD -s 192.168.10.10 -d 192.168.20.0/24 -j ACCEPT
For Cisco IOS ACL:
ip access-list extended CUI-FILTER
 deny ip 192.168.10.0 0.0.0.255 192.168.20.0 0.0.0.255
 permit tcp host 192.168.10.10 192.168.20.0 0.0.0.255 eq 3389
And a sample Windows PowerShell host firewall rule to block inbound SMB from user subnet:
New-NetFirewallRule -DisplayName "Block SMB from Users" -Direction Inbound -Action Block -RemoteAddress 192.168.10.0/24 -Protocol TCP -LocalPort 445
These patterns (deny-by-default, allow-specific) are what auditors expect to see in configuration files and change logs.

Real-world small-business scenario

Consider a 25-person subcontractor with an engineering team that handles CUI and an accounting group that does not. Create a CUI VLAN for engineering workstations and servers, restrict access so only engineering and specific admins can reach those systems, and put shared public services (printer, guest Wi‑Fi) on separate VLANs. Use a jump host in the CUI VLAN for administrative RDP/SSH and force VPN connections to that jump host with MFA β€” that both limits direct exposure and provides an auditable control point for access requests, which can be shown to assessors as evidence for SC.L1-B.1.X.

Documentation, evidence, and testing for the Compliance Framework

Document the segmentation design, ACLs, firewall configuration snapshots, VLAN assignments, and access control policies. Maintain change tickets or a configuration management log for any network rule changes. Test the segmentation by performing simple scans (nmap) from different VLANs and capturing results to show blocked vs allowed traffic. Collect logs (firewall allow/deny entries, VPN authentication logs) and retain them per your policy; these form the evidence package for assessments under FAR 52.204-21 and CMMC 2.0 Level 1.

Risks of not implementing segmentation and best-practice tips

Without segmentation and strict access controls you increase the risk of lateral movement after a compromise, uncontrolled exposure of CUI, regulatory penalties, contract loss, and reputational damage. Small businesses often become targets because attackers know they have fewer controls. Best practices: apply least privilege, deny-by-default network posture, enforce MFA, patch and inventory endpoints, use host-based firewalls and NAC, log and monitor access, and keep an actionable POA&M for gaps you cannot immediately remediate.

Summary: for Compliance Framework requirements such as FAR 52.204-21 and CMMC 2.0 Level 1 (SC.L1-B.1.X), a focused, documented approach built around asset inventory, VLAN/subnet segmentation, deny-by-default firewall rules, host controls, MFA, and clear evidence collection gives small businesses an efficient path to compliance. Implement the simple technical controls above, validate them with tests and logs, and keep documentation current β€” those steps both reduce risk and satisfy assessors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes