🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.7: Enforce Least Privilege and Block Non-Privileged Execution (Step-by-Step)

Step-by-step guidance to implement AC.L2-3.1.7—enforce least privilege and prevent non-privileged execution—so your organization can protect CUI and meet NIST SP 800-171 / CMMC 2.0 Level 2 requirements.

April 21, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains, step-by-step, how to implement NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AC.L2-3.1.7—enforcing least privilege and blocking non-privileged execution—so you can reduce attack surface, protect Controlled Unclassified Information (CUI), and produce auditable evidence for your Compliance Framework program.

What AC.L2-3.1.7 Requires (Compliance Framework Context)

At its core AC.L2-3.1.7 requires organizations to ensure users operate with the minimum privileges necessary and to prevent lower-privileged accounts from executing code or performing actions reserved for administrators. For Compliance Framework programs this means documenting privilege models, implementing technical controls to prevent non-privileged execution of sensitive utilities and code, and demonstrating continuous enforcement and monitoring. The objective is to limit lateral movement, privilege escalation, and unauthorized software/ script execution that could compromise CUI.

Step-by-step implementation (practical)

Step 1 — Inventory and role definition

Start by inventorying all endpoints, servers, cloud workloads, and privileged accounts. Classify accounts into roles (end user, service account, application account, local admin, domain admin). Document which job functions need elevation and for what systems. For a small business (10–100 employees) this can be a spreadsheet with columns: username, role, justification for admin rights, systems accessible, and expiration/review date. This inventory is the foundation of least-privilege decisions and exception handling within your Compliance Framework records.

Step 2 — Remove unnecessary local admin rights and enforce just-in-time elevation

Remove persistent local admin rights from standard users. Use Microsoft LAPS to manage local admin passwords when local admin is unavoidable, and use Just-In-Time (JIT) elevation tools (Azure AD PIM, BeyondTrust, CyberArk, or built-in OS elevation prompts with approval workflows) for on-demand admin tasks. For smaller shops without PAM tools, implement a documented approval process: time-limited elevation via a ticketing system and temporary password injection through LAPS or an approved tool. Log all elevation events for audit evidence.

Step 3 — Implement application control / execution restrictions

Implement application allowlisting or application control to prevent non-privileged users from running unapproved binaries, scripts, or macros. On Windows, deploy AppLocker or Windows Defender Application Control (WDAC); start in Audit mode to collect data, craft rules (by publisher hash, path, or file hash), then move to Enforcement. On macOS, use Gatekeeper and MDM profiles (Jamf, Intune) to restrict unsigned apps; on Linux use AppArmor or SELinux policies and mount /tmp and removable media with noexec where possible. Additionally, create Group Policy or MDM rules to prevent execution from user-writable locations such as %AppData%, %Temp%, and user Downloads folders—these are common vectors for non-privileged execution.

Step 4 — Restrict script engines and interpreter abuse

Configure PowerShell, Python, Bash and other interpreters to limit abuse: enable PowerShell constrained language mode for non-admins or require signed scripts (Set-ExecutionPolicy AllSigned), enable script block logging, and block unsigned macros through Exchange/Office 365 or endpoint controls. For Linux, disable or restrict interpreters in service accounts and chroot/jail sensitive services. Combine interpreter restrictions with endpoint detection and response (EDR) rules to block obfuscated or child-process-spawning scripts that are launched by non-privileged users.

Technical controls and monitoring

Pair prevention with monitoring: enable process creation logging (Windows Event 4688, Sysmon Event ID 1), script block logging, and command-line auditing to detect attempts at non-privileged execution. Forward logs to a centralized SIEM (Splunk, Elastic, Microsoft Sentinel) and create alerts for suspicious behaviors—new service creation, unexpected parent-child process relationships, and execution from user temp directories. Use EDR capabilities (behavioral blocking, isolation) to automatically stop malicious process chains while keeping a forensic trail for compliance evidence.

Real-world small business scenarios

Example 1: A 25-person engineering firm handling DoD subcontractor data removed local administrator rights from engineers, deployed Intune with WDAC in audit mode, and blocked execution from %AppData% and Downloads via GPO. After two weeks of auditing, they created publisher-based allowlist rules for their CAD software and moved WDAC to enforcement—resulting in fewer malware incidents and clear documentation for an audit. Example 2: A small SaaS startup used Linux containers; they mounted /tmp with noexec, constrained service accounts, and used SELinux policies to prevent a compromised web app from spawning a shell and executing binaries as a low-privileged process.

Compliance tips and best practices

Document policies and exceptions: maintain an exception register with risk acceptance, compensating controls, and expiration dates. Start app control in audit mode to minimize operational disruption; use telemetry to create rules incrementally. Train helpdesk and application owners on the approval workflow for elevation and a documented rollback plan. Use multifactor authentication for any elevation requests, and review privileged accounts quarterly. For evidence, keep configuration baselines (GPOs, WDAC policies, LAPS settings), change logs, and SIEM alerts—Compliance Framework assessors expect reproducible evidence.

Risk of not implementing AC.L2-3.1.7

Failing to enforce least privilege and block non-privileged execution increases risk of lateral movement, privilege escalation, ransomware, and data exfiltration—especially dangerous when handling CUI. Attackers commonly exploit user-writable locations, scripting engines, and persistent local admin accounts. Non-compliance can result in failed audits, contract loss, and increased incident response costs. For small businesses, a single compromise can lead to regulatory penalties and reputational damage that can be existential.

Summary: Implementing AC.L2-3.1.7 requires a combination of policy, procedural controls, and technical enforcement: inventory roles, remove unnecessary admin rights, deploy application control, restrict interpreters, and monitor execution with EDR/SIEM. Start small (audit mode, select pilot groups), document everything for your Compliance Framework, and iterate—this produces measurable risk reduction and the auditable evidence needed for NIST SP 800-171 / CMMC 2.0 Level 2 compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes