🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I

Practical guide for SMBs to implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I – Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

Understanding the Requirement

This control requires you to identify who and what is allowed to use your systems and then ensure only those identified users, automated processes, and devices can access them. From the FAR/CMMC perspective, you must be able to show that authorized users are identified, processes acting on behalf of users are identified, and authorized devices (including other systems) are identified — and that access is limited to those identified entities. The guidance below is written for small and medium businesses implementing the FAR 52.204-21 / CMMC 2.0 Level 1 control.

Technical Implementation

  • Inventory and authorize: Create and maintain a current inventory of authorized user accounts, service/process accounts, and devices. Store this in a simple System Access Authorizations spreadsheet or a lightweight identity management tool and record the owner and approval source for each entry.

  • Formalize account lifecycle processes: Implement documented onboarding and offboarding procedures that require manager/HR approval for account creation and immediate removal or disabling of accounts when an employee departs or changes roles. Automate disabling where possible (for example, via HR integration or a ticketing workflow) to reduce manual delay.

  • Use least privilege and service accounts: Ensure user accounts receive only the minimum access required. Separate interactive user accounts from process/service accounts used by scripts or automation; register and document service accounts and restrict their privileges and network access.

  • Control device access: Maintain an authorized device list and enforce network access control (NAC) or VLAN segmentation so only managed corporate devices can reach sensitive systems. Block or quarantine unknown MAC addresses at the DHCP/edge switch level and require devices to be registered before granting full access.

  • Authentication and access enforcement: Require unique, password-protected accounts and enable multi-factor authentication (MFA) on systems that support it. Use centralized authentication (for example, RADIUS/Active Directory or cloud identity services) so access enforcement and logging are consistent.

  • Periodic review and logging: Schedule quarterly reviews of accounts, processes, and device lists to remove unused or unauthorized entries. Log authentication and access attempts so you can detect and investigate unauthorized access quickly.

Example in a Small or Medium Business

Midtown Engineering, a 65-person company, maintains a simple System Access Authorizations spreadsheet that lists every employee, approved contractors, service accounts, and all corporate devices. HR sends an onboarding packet that includes a request form; IT creates accounts only after receiving the approved form and records the approver in the spreadsheet. When an employee leaves, HR files a termination notice to IT, and the system admin disables the account at the specified time and records the action. Automated processes such as nightly backup scripts run under dedicated service accounts with restricted privileges and are logged in the inventory. The company enforces device controls by requiring corporate laptops to be enrolled in device management before receiving full network access; a separate guest VLAN provides web-only access to visitors. One afternoon an employee connects a personal laptop and the NAC places it on a quarantine network; IT notifies the user and explains company policy prohibiting personal devices for corporate access. Quarterly, IT and the security lead review the inventory and delete stale accounts and devices, ensuring only authorized users, processes, and devices retain access.

Summary

Meeting AC.L1-B.1.I is a mix of clear policies and simple technical controls: maintain an authoritative list of authorized users, processes, and devices; enforce account lifecycle procedures; restrict access via authentication, segmentation, and device controls; and perform regular reviews and logging. For SMBs, straightforward documentation, consistent onboarding/offboarding, device enrollment, and periodic cleanup provide practical, cost-effective evidence that only authorized entities can access company systems.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes