🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Train Your IT Team to Enforce FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Roles, Procedures, and Tooling

Practical, step-by-step guidance for IT teams to implement and enforce FAR 52.204-21 / CMMC 2.0 Level 1 control IA.L1-B.1.V through roles, procedures, automation, and tooling.

•
April 22, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

FAR 52.204-21 and CMMC 2.0 Level 1 Control IA.L1-B.1.V require that organizations enforce basic identity and access controls—unique identities, authentication, and role-based access—to protect Federal contract information (FCI) and other sensitive data; this post gives small-business IT teams concrete roles, step-by-step procedures, and recommended tooling to operationalize that control within the "Compliance Framework" environment.

Define clear roles and responsibilities

Start by mapping responsibilities to named roles: an Access Owner (business process owner) approves access; an IAM Administrator (IT) implements and audits accounts; a Local Administrator (device-level) handles endpoint troubleshooting; HR owns the onboarding/offboarding trigger; and an Auditor or Compliance Officer collects evidence. For a small business (10–50 employees), one person can wear multiple hats, but document who is accountable for each task in the Compliance Framework control matrix so evidence trails are available during assessments.

Practical onboarding and offboarding procedures

Establish a repeatable, documented workflow for account lifecycle: HR creates a ticket in the helpdesk system with role and access needs; the Access Owner reviews and approves; IAM Admin provisions accounts in Azure AD / Google Workspace / AWS IAM using templates or SCIM; group membership is applied to enforce least privilege; and a final checklist verifies MFA, device enrollment, and training completion. For offboarding, automate account disablement using HR events (e.g., terminate date), remove cloud sessions, revoke tokens and OAuth consents, and archive ownership transfer for any shared assets. Use a single runbook per role with step-by-step commands (for example, PowerShell commands to disable AD accounts or Azure AD Graph API calls) so the process is consistent and auditable.

Authentication and access control tooling — specific recommendations

Implement multi-factor authentication (MFA) across all accounts with access to FCI — acceptable methods include TOTP apps, hardware keys (FIDO2/WebAuthn), or push notifications; avoid SMS when possible. Enforce password policies aligned to the Compliance Framework: minimum 12 characters, no more than a 90-day rotation unless compromised, and account lockout after 5 invalid attempts with 15-minute lockout window. Use SSO (SAML/OAuth) via Okta, Azure AD, or Google Workspace to centralize identity, and integrate SCIM for automated provisioning. For privileged or administrative accounts, adopt a lightweight privileged access management (PAM) solution (e.g., JumpCloud, BeyondTrust, or built-in Azure Privileged Identity Management) to require just-in-time elevation and session recording where feasible.

Monitoring, auditing, and collecting evidence

Enable and centralize audit logs: Azure AD sign-in logs, Google Workspace admin audit logs, AWS CloudTrail, and Windows Event forwarding to a SIEM (or a log archive) are essential. For a small shop, an inexpensive SIEM or a hosted log service (Splunk Cloud, Sumo Logic, or an MSSP-provided log store) will capture authentication failure rates, MFA bypass attempts, and account lockouts. Retain logs per the Compliance Framework requirements (document your retention period) and generate monthly access review reports showing active privileged accounts, admin group membership, and unassigned privileges. Capture evidence as immutable exports (CSV or PDFs) and store them in a secure, versioned evidence repository for assessments.

Training, runbooks, and operationalizing behavior

Train IT staff on both policy and tooling: run hands-on workshops that walk through provisioning, deprovisioning, emergency access procedures, and how to pull audit evidence. Create short runbooks for common tasks (create user, revoke access, enable MFA, respond to suspected account compromise) and conduct quarterly tabletop exercises simulating a lost credentials incident, an ex-employee access event, or a phishing-induced credential theft. For small businesses, assign a monthly “access review” duty to ensure group membership and local admin lists are current; document these reviews and corrective actions to show continuous enforcement.

Non-implementation risks are significant: failure to enforce IA.L1-B.1.V can lead to unauthorized access to contract data, data exfiltration, fines, contract termination, and a loss of trust with government customers; at the operational level, orphaned accounts and unchecked privileged access increase lateral movement risk. Real-world small-business scenarios include a terminated employee whose cloud session remained active and was used to access sensitive repositories or an unmanaged admin account used as a foothold for ransomware—both avoidable with consistent procedures and automated deprovisioning.

Compliance tips and best practices: document everything in your Compliance Framework control repository; use automation (SCIM, provisioning scripts, conditional access policies) to reduce human error; keep evidence exports versioned; use least privilege and role-based access control matrices; schedule automated alerts for suspicious authentication patterns; and, when budget-constrained, prioritize MFA, centralized logging, and automated offboarding as the highest-impact investments.

Summary: To enforce FAR 52.204-21 / CMMC 2.0 Level 1 Control IA.L1-B.1.V, define explicit roles, build repeatable onboarding/offboarding procedures, deploy pragmatic tooling (SSO, MFA, PAM for privileged users, centralized logs), and train your IT staff with runbooks and tabletop exercises—these steps turn Compliance Framework requirements into operational practices that a small business can implement and evidence during assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes