🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Secure Remote and Cloud Connections: Practical Steps and Tools to Limit External System Use — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.III

Practical, step‑by‑step guidance for small businesses to limit use of external systems and secure remote/cloud connections to meet FAR 52.204‑21 and CMMC 2.0 Level 1 requirements.

April 10, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204‑21 and CMMC 2.0 Level 1 control AC.L1‑B.1.III means preventing uncontrolled remote or cloud systems from touching your contract data — you must identify, limit, and technically control which external systems can be used to access Federal Contract Information (FCI) or Controlled Unclassified Information (CUI) and show evidence that controls work. This post gives practical steps, concrete tools, and small‑business examples you can implement today to limit external system use while remaining compliant.

Practical implementation steps (overview)

Start with an inventory and a simple policy. Inventory every external system, cloud app, and remote access method used to access company systems (VPNs, SaaS apps, contractor personal email, unmanaged cloud storage). Classify the data flows — mark FCI/CUI, internal non‑sensitive, and public data. Create a short policy that mandates: only company‑approved, managed devices and sanctioned cloud services can store or access FCI/CUI; personal accounts and unsanctioned third‑party cloud apps are prohibited for contract data. Record approvals and exceptions in a central register to produce evidence for auditors.

Technical controls: access, devices, and network restrictions

Implement technical controls that enforce the policy. Require MFA for all accounts that can access company resources; enable conditional access that blocks legacy authentication and denies access from unmanaged devices. Use a modern MDM/UEM (e.g., Microsoft Intune, Jamf, or VMware Workspace ONE) to ensure only compliant, patched devices access sensitive systems. For network access, prefer a zero‑trust approach: require endpoint posture checks before granting access to cloud apps or VPN segments, and disable split‑tunneling for VPNs used to access contract systems so traffic flows through your security stack.

Cloud access: CASB, API controls, and SaaS hardening

For cloud services, use a Cloud Access Security Broker (CASB) or native SaaS controls. In Microsoft 365, enforce conditional access policies that require device compliance and MFA to access SharePoint/OneDrive; disable unmanaged device download for sensitive libraries. Use OAuth app allow‑listing (Azure AD or Google Workspace) to prevent third‑party apps from siphoning data via granted consent. Configure DLP rules to detect keywords, document markings, or CUI patterns and block uploads to unsanctioned storage or external sharing links. For small teams, even using built‑in admin controls (blocking external sharing, limiting guest access, disabling consumer email forwarding) provides substantial protection.

Endpoint and local controls

Protect endpoints that connect remotely. Deploy an EDR/antivirus with cloud telemetry (e.g., Microsoft Defender for Endpoint, SentinelOne) and enforce disk encryption (BitLocker on Windows, FileVault on macOS) through MDM. Remove local admin rights: use LAPS or a PAM solution for short‑term elevation. Disable or restrict removable media (USB) where contract data is handled, or implement removable media encryption and scanning. Maintain a strict patching cadence (monthly critical/security updates) and automate where possible — a compromised endpoint is the most common path for external systems to bring in risk.

Logging, monitoring, and evidence for auditors

Collect logs that demonstrate control effectiveness. Centralize authentication and access logs (Azure AD sign‑ins, VPN logs, CASB/API logs) into a lightweight SIEM or log store (Splunk, Elastic, or cloud native like Azure Sentinel) and keep logs for a period consistent with contract needs and organizational risk (90 days minimum is common for Level 1 evidence, longer if required). Create alerting for unusual access patterns (logins from new countries, large downloads, or OAuth token grants). Document your monitoring process and retain screenshots or exported logs as compliance artifacts.

Small business scenario: 20‑person defense contractor

Example: ACME Defense has 20 users and uses Microsoft 365 and a third‑party file share for contractors. Steps they implemented: (1) Inventoryed all apps and banned personal Gmail for work; (2) Created policy: only company M365 accounts on company‑managed devices may access FCI; (3) Enabled Azure AD Conditional Access to require Intune compliance and MFA; (4) Turned on DLP to prevent files with specific keywords from being shared externally; (5) Blocked third‑party OAuth app consent and allowed only company‑approved apps; (6) Deployed Defender for Endpoint and BitLocker; (7) Centralized logs in a low‑cost Elastic instance and archived screenshots of policy settings for audits. This sequence gave ACME a clear audit trail to show compliance with FAR 52.204‑21 / CMMC Level 1.

Compliance tips and best practices

Keep it simple and document everything: maintain an “approved external systems” list, attach a business justification and expiration for each exception, and version your access policies. Prioritize controls that give high return for low cost: MFA + conditional access, MDM enrollment, and DLP rules. Test your controls quarterly by simulating a contractor trying to use an unsanctioned cloud service — capture results as evidence. Train staff on what counts as FCI and make reporting easy for suspected policy violations. Finally, align your evidence artifacts (policies, screenshots, logs, exception register) with the specific FAR/CMMC requirements so an assessor can quickly map your controls to the practice AC.L1‑B.1.III.

Risk of not limiting external systems

Allowing uncontrolled external systems or unmanaged devices to access contract data increases risk of data exfiltration, lateral movement into your corporate network, and supply‑chain compromise. Consequences include losing contracts, mandatory breach notifications, civil penalties, and reputational damage. From a technical perspective, unmanaged cloud apps and OAuth‑authorized third‑party services are common initial access vectors and can bypass perimeter controls if not explicitly restricted.

Summary: limiting external system use is achievable for small businesses by combining simple policies, device and identity controls, cloud hardening (CASB/DLP/allow‑listing), endpoint protection, and logging. Build a short control map that links each technical control to FAR 52.204‑21 / CMMC 2.0 Level 1 practices, gather the artifacts (policies, exception logs, screenshots, and access logs), and test periodically — these concrete steps will reduce risk and provide the evidence needed for compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes