🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement Role-Based Access Control in Active Directory to Limit Information System Access — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.II

Practical, step-by-step guidance for implementing Role-Based Access Control (RBAC) in Active Directory to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 access-limiting requirements.

April 11, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Implementing Role-Based Access Control (RBAC) in Active Directory (AD) is a practical, measurable way to meet FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.II requirements to limit information system access to authorized users and roles; this post provides hands-on steps, PowerShell examples, small-business scenarios, and compliance evidence you can use right away.

What the requirement means and key objectives

The goal of FAR 52.204-21 and CMMC AC.L1-B.1.II is simple: ensure only authorized, role-appropriate users can access systems and data (including CUI where applicable). For Compliance Framework mapping, that translates into a few concrete objectives — identify roles, assign least-privilege rights via AD security groups, control resource access through group-based ACLs, document decisions, and periodically review and attest to access.

Implementation notes (high level)

Practical notes for compliance: use security groups (not individual ACLs) as your authorization mechanism, design an OU and group naming scheme that supports role mapping, limit direct assignment of rights to users (use groups), enforce privileged account protections (AdminSDHolder, LAPS, break-glass), and produce evidence: group membership reports, GPOs applied, access reviews, and audit logs.

Step-by-step RBAC implementation in Active Directory

1) Inventory: list business functions and map them to roles (e.g., Engineer, Finance Approver, HR Admin). 2) Design AD constructs: create OUs for organizational units, security groups for roles, and use domain-local groups for resource ACLs and global groups for user membership where appropriate. 3) Apply least privilege: give each role only the NTFS/share/AD rights required. 4) Automate and document: use PowerShell to create groups and assign permissions and maintain a change log for compliance evidence.

Design decisions: group scope and naming

Use this simple rule-of-thumb: Global groups for users in the same domain that share a role (e.g., GG-ENG-ROLE), Domain Local groups for resource permissions (DL-Share-Finance), and Universal groups only when needed across domains. Adopt a consistent naming convention like [Scope]-[Function]-[Role]-[Environment] (e.g., GG-ENG-READ-PRD). That makes audits easy and reduces misconfiguration risk.

Concrete technical details and PowerShell examples

Below are representative commands you can adapt. These examples create a role group, add users, and grant NTFS permission to a file share. Replace the DN, group names, and paths for your environment.

# Create a security group for Engineers
New-ADGroup -Name "GG-ENG-READ-PRD" -GroupScope Global -GroupCategory Security -Path "OU=Groups,DC=contoso,DC=local" -Description "Engineers - Read access to production engineering share"

# Add a user to the group
Add-ADGroupMember -Identity "GG-ENG-READ-PRD" -Members "j.smith"

# Create a domain local group for the resource
New-ADGroup -Name "DL-ENG-SHARE-PRD" -GroupScope DomainLocal -GroupCategory Security -Path "OU=Groups,DC=contoso,DC=local"

# Nest global into domain local (best practice)
Add-ADGroupMember -Identity "DL-ENG-SHARE-PRD" -Members "GG-ENG-READ-PRD"

# Grant NTFS permission on a folder (PowerShell)
$acl = Get-Acl "\\fileserver\eng-prod"
$rule = New-Object System.Security.AccessControl.FileSystemAccessRule("DL-ENG-SHARE-PRD","ReadAndExecute","ContainerInherit, ObjectInherit","None","Allow")
$acl.SetAccessRule($rule)
Set-Acl "\\fileserver\eng-prod" $acl

For documenting and evidence collection, export group membership and ACLs on a schedule:

# Export group membership for audit
Get-ADGroupMember -Identity "GG-ENG-READ-PRD" -Recursive | Select Name,SamAccountName | Export-Csv C:\Audit\GG-ENG-READ-PRD-members.csv -NoTypeInformation

# Export NTFS ACLs
Get-Acl "\\fileserver\eng-prod" | Format-List | Out-File C:\Audit\eng-prod-acl.txt

Privileged account controls and delegation

Protect administrative roles: separate day-to-day user accounts from admin accounts, apply the tiered administration model (Tier 0: Domain Controllers and AD; Tier 1: Servers; Tier 2: Workstations), and enable AdminSDHolder protections for privileged groups. Use Microsoft LAPS to manage local admin passwords and Just Enough Administration (JEA) or time-bound privileged access workflows for break-glass scenarios. Use the Delegation of Control Wizard only for well-documented, minimal tasks and prefer scripted, auditable delegation where possible.

Monitoring, auditing, and demonstrating compliance

Enable AD and object access auditing (Group Membership changes, Directory Service Changes, and Object Access) and forward logs to a central collector or SIEM. Useful Event IDs to capture include 4728/4729/4732/4733 (group membership changes), 4662 (object was accessed), and 4670 (permissions changed). Schedule quarterly access reviews and maintain signed attestation records that roles and memberships were reviewed. For FAR/CMMC evidence, export group membership reports, show GPO settings, and provide event log extracts demonstrating changes and reviews.

Small-business example scenario

Imagine a 25-person small contractor with CUI in engineering drawings. Implement RBAC by mapping four roles: ENG, FIN, HR, and STAFF. Create GG-ENG-READ-PRD and GG-ENG-WRITE-PRD, DL-ENG-SHARE-PRD for the fileserver, and assign engineers into the appropriate GG. Use a single "break-glass" admin account stored offline with multi-factor controls for emergency use only. Run a monthly script that exports membership CSVs and an access-review checklist signed by the ISSO or owner — that package is precisely the evidence auditors look for under FAR and CMMC Level 1.

Risks of not implementing RBAC and compliance tips

Without RBAC you risk privilege creep (users accumulate access over time), unauthorized data exposure, difficulty demonstrating who had access during an incident, and failure to meet FAR/CMMC requirements — all of which can lead to lost contracts, penalties, or breach remediation costs. Compliance tips: start simple, use group-based access only, automate reports, enforce MFA for all remote and privileged access, schedule attestation reviews, and document every role-to-resource decision in a single access control matrix.

In summary, implementing RBAC in Active Directory to meet FAR 52.204-21 and CMMC 2.0 Level 1 is achievable for small businesses by inventorying roles, using security groups and domain-local resource groups, applying least privilege, protecting privileged accounts, enabling auditing, and producing routine attestation evidence — combine these technical steps with clear documentation and scheduled reviews to maintain compliance and reduce operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes