🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Migrate Public-Facing Services into Compliant Subnetworks Without Downtime — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SC.L1-B.1.XI

Step-by-step guidance for migrating internet-facing services into compliant subnetworks to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements without service interruption.

April 24, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Moving public-facing services into a compliant subnetwork while keeping users online is a common but sensitive task for small contractors subject to FAR 52.204-21 and CMMC 2.0 Level 1 controls (SC.L1‑B.1.XI); this post provides a practical, low-risk migration pattern, concrete technical controls, and examples you can adapt to meet compliance objectives without downtime.

Planning and prerequisites (Compliance Framework considerations)

Begin with documentation: record the compliance requirement mapping (FAR 52.204-21 obligations and the relevant CMMC L1 control language), the assets to be migrated, current network topology, and the test plan. Key objectives are to isolate public-facing functions into subnetworks that have explicit boundary protections (WAF, ACLs, least-privilege security groups), ensure logging/monitoring is enabled, and keep a verifiable audit trail. Implementation notes: treat the migration as a configuration and change-control activity—use versioned IaC (Terraform/CloudFormation/ARM) and a change ticket that references the compliance mapping.

Inventory, classification, and sandbox testing

Inventory every endpoint, hostname, TLS cert, and backend dependency. For a small business this might be 'www.example.com' (public website), 'api.example.com' (public API), a database, and external SaaS integrations. Classify assets by sensitivity and public exposure; even public services can touch Sensitive Information, so record data flows. Create a test sandbox that mirrors routing and security controls to validate the migration (same listener ports, certs, and DNS TTL behavior). Run application-level smoke tests and synthetic transactions against the sandbox prior to cutover.

Technical migration patterns (zero-downtime strategies)

Use an indirection layer and traffic shifting to avoid downtime. Patterns that work well: blue/green (deploy compliant environment in parallel and switch traffic), canary/weighted DNS (Route 53 weighted records or Cloudflare Load Balancing), and reverse-proxy redirect (deploy a new reverse proxy/WAF cluster in front of the compliant subnet and gradually route traffic). Key technical rules: never cut off the existing public endpoint until the new path responds correctly to all health checks; pre-provision TLS certificates for the new environment and sync session affinity or cookie behavior to avoid user logout.

AWS concrete example — ALB + private targets + Route 53 weighted cutover

Small-business example: you currently run EC2 instances in a public subnet. Create a new VPC/private subnet group and put application instances or ECS tasks there. Deploy an Application Load Balancer (ALB) in public subnets with a security group allowing 80/443 from 0.0.0.0/0 and a target group that points to instances in the compliant private subnets. Restrict instance security groups to accept traffic only from the ALB's security group. Test internally. Use Route 53 weighted records or an ALB listener rule to move traffic: start with 5% to the new ALB, monitor metrics (5xx, latency, synthetic transactions), then 25%, 50%, 100%. For on-prem environments, equivalent steps use a reverse proxy/load balancer and DNS TTL adjustments. Example security group rule set: ALB SG inbound 0.0.0.0/0:443, instance SG inbound ALB-SG:8080, instance SG outbound NAT only for required external services.

Operational controls, monitoring, and evidence collection

Enable and retain logs to demonstrate compliance: web access logs, WAF logs, VPC flow logs, system auth logs, and change-control records. For AWS, centralize logs in CloudWatch Logs or an S3 bucket with lifecycle rules and enable AWS Config to capture configuration snapshots. Document test results from each weighted cutover phase and keep synthetic-transaction dashboards (CloudWatch, Datadog) as evidence. Automate rollback playbooks: if error rate rises above pre-set thresholds (e.g., 5xx > 1% or latency increases by 50%), revert weights or switch ALB target groups back. Maintain a runbook with exact CLI/API commands for rollback to satisfy auditors that you have a controlled, reversible migration.

Practical tips, best practices, and small-business scenarios

Practical tips: reduce DNS TTLs to 60 seconds before migration to speed cutover, pre-warm caches (CloudFront/edge CDN) if used, and keep a short maintenance window ready but avoid planned downtime by using weighted DNS. For small managed WordPress sites, spin up a hardened instance in the compliant subnet with plugins and DB replicas synced, use a CDN+WAF in front, then switch. For an API service, ensure token/session validation is consistent across old and new environments to prevent authentication failures. Use IaC modules for repeatability and include compliance tags and descriptions so auditors can see intent and ownership in the cloud console.

Risks of not implementing compliant segmentation

Failing to isolate public-facing services risks lateral movement into internal systems, data exfiltration, and failure to meet FAR 52.204-21 basic safeguarding—which can lead to contract penalties, loss of federal work, reputational harm, and exposure of customer data. For small contractors, one exploit can mean multimonth remediation across billable client work. Additionally, absence of logs, change records, or rollback plans raises red flags during audits and increases remediation time and cost.

Summary: Plan, parallelize, and shift traffic slowly while you verify behavior; use IaC, logging, and change-control records to create an auditable migration path; implement boundary protections (WAF, restricted security groups, NAT for controlled egress) and automated rollback triggers to eliminate downtime risk while meeting FAR 52.204-21 and CMMC L1 expectations. With a small-business mindset—automate, test in a sandbox, collect evidence, and stage traffic—you can achieve compliant segmentation with minimal disruption.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes