🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use Identity Management and MFA to Limit Information System Access to Authorized Entities — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I

Practical guide to implementing identity management and multi-factor authentication (MFA) to meet FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.I) requirements for limiting system access to authorized entities.

April 06, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Limiting access to information systems to only authorized users, processes, and devices is a foundational requirement under FAR 52.204-21 and CMMC 2.0 Level 1 (Control AC.L1-B.1.I); implementing a robust identity management program combined with multi-factor authentication (MFA) is the most practical and effective way for small businesses to meet these obligations while reducing the real-world risk of credential theft and unauthorized access.

Requirement and Key Objectives

FAR 52.204-21 requires contractors to provide “basic safeguarding” of contractor information systems, and CMMC 2.0 Level 1 AC.L1-B.1.I focuses on ensuring information system access is limited to authorized entities. The key objectives are to: strictly authenticate every identity trying to access systems, enforce least-privilege access, maintain an auditable account lifecycle (provisioning, modification, deprovisioning), and ensure that authentication is resilient to credential compromise through MFA.

Practical Implementation Steps (Compliance Framework)

Begin with an identity inventory: map all user accounts, service accounts, admin accounts, devices, and third-party integrations that touch systems holding controlled information. Then choose an identity provider (IdP) aligned to your environment—Azure AD, Okta, JumpCloud, or a cloud IAM—and migrate all cloud and on-prem authentication to that IdP (SSO). Enforce single sign-on (SSO) so access decisions are centralized and consistent with the Compliance Framework practice of centralized control and auditability.

Account Lifecycle and Access Controls

Create role-based access control (RBAC) groups that reflect job functions and apply the principle of least privilege: grant the minimum permissions required for a role. Automate provisioning and deprovisioning using SCIM when possible, and establish periodic access reviews (e.g., 30–90 days) to detect stale or orphaned accounts. For service accounts, avoid interactive logins, use managed identities or short-lived certificates/tokens, and store secrets in a vault (HashiCorp Vault, AWS Secrets Manager, 1Password Business) with rotation policies.

MFA and Technical Configuration Details

Require MFA for all interactive logins and particularly for privileged roles and remote access (VPN, RDP, admin consoles). Prefer phishing-resistant factors: FIDO2/WebAuthn hardware tokens (YubiKey), platform authenticators, or certificate-based authentication combined with MFA. If using TOTP as a secondary factor, enforce 6-digit codes with 30-second windows, require device registration with attestation, and enable step-up authentication for sensitive operations. For VPNs and network gear, implement certificate-based client authentication plus an MFA check via RADIUS or an IdP that supports SAML/OIDC. Disable legacy/auth protocols (IMAP/POP/Basic Auth) and enforce modern OAuth2/OIDC where possible.

Real-World Small Business Scenarios

Example 1 – Cloud-first small contractor: A 25-person SaaS firm uses Azure AD P1 and enables conditional access policies to require MFA for all non-compliant devices, logins from new locations, or access to sensitive applications. They use SCIM for Okta-to-SaaS provisioning, store API keys in a vault, and use Azure AD Privileged Identity Management (PIM) to timebox elevated roles.

Example 2 – Small manufacturer with on-prem and VPN: The company adopts JumpCloud as a unified IdP for local Windows/Mac/Linux machines, configures Duo for MFA on VPN and RDP, issues machine certificates using an internal CA, and migrates service accounts to managed identities for backup and monitoring tools. They rotate backup credentials monthly and forward auth logs to a lightweight SIEM (Elastic Cloud) for alerting on anomalous logins.

Risks of Not Implementing Identity Management and MFA

Failing to centrally manage identities and enforce MFA exposes an organization to credential-based intrusions, lateral movement, data exfiltration, and ransomware. For contractors subject to FAR and CMMC, a breach can result in contract termination, loss of future contracts, regulatory penalties, and reputational harm. Technical consequences include unauthorized access to CUI, compromised service accounts with broad privileges, and the inability to produce access logs for incident response.

Compliance Tips and Best Practices

Operationalize controls: enable audit logging in your IdP and cloud platforms, stream logs to a SIEM, and set alerts for impossible-travel, repeated MFA failures, and new device enrollments. Use conditional access: block legacy auth, restrict access by device compliance and geolocation, and require MFA for risky sign-ins. Document your identity architecture in policy artifacts mapped to FAR 52.204-21 and CMMC controls, run periodic tabletop exercises to validate deprovisioning, and keep a simple runbook for incident response that includes steps to revoke sessions and rotate compromised credentials.

Implementing identity management and MFA isn't a one-time checkbox: it requires tool configuration, process discipline (provisioning, reviews, logging), and ongoing monitoring. For small businesses, prioritize centralizing auth to an IdP, enforcing MFA with phishing-resistant factors where feasible, automating account lifecycle tasks, and instrumenting logging/alerts to detect anomalies—these steps will align you with FAR 52.204-21 and CMMC 2.0 Level 1 (AC.L1-B.1.I) while materially reducing your attack surface.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes