🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use PAM and MFA to Enforce NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.15: Practical Implementation Steps

Step-by-step guidance for small organizations to implement Privileged Access Management (PAM) and Multi-Factor Authentication (MFA) to meet AC.L2-3.1.15 requirements under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

•
April 17, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Privileged Access Management (PAM) combined with Multi-Factor Authentication (MFA) is one of the most effective, practical ways to meet the intent of AC.L2-3.1.15 in NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 — protecting privileged access and remote privileged sessions that could expose Controlled Unclassified Information (CUI); this post gives step-by-step actions, small-business examples, and technical details to implement a defensible control set.

What AC.L2-3.1.15 intends and key objectives

The control lives in the Access Control family and targets limiting and securing privileged and remote access that could lead to unauthorized access to CUI. The practical objectives are: inventory privileged accounts, require strong authentication for them, broker privileged sessions (remove direct secrets from users), record/monitor privileged activities, and make access time-limited and auditable. For compliance frameworks this means demonstrable policies, technical enforcement (PAM + MFA), and logs/alerts retained for audits.

Step 1 — Inventory, classify, and minimize privileged identities

Start with discovery: enumerate local admin accounts, service accounts, cloud provider root/owner accounts, database superusers, and application service accounts. Use automated discovery tools in your PAM product or simple AD/LDAP scripts (e.g., PowerShell: Get-ADUser -Filter {MemberOf -eq 'Domain Admins'}). For a small subcontractor (10–50 users), classify accounts as "Privileged-High" (Domain Admin, AWS root), "Privileged-Mid" (server admins, DBAs), and "Privileged-Service". Eliminate unnecessary privileged accounts, consolidate service accounts into managed identities (e.g., Azure Managed Identity, AWS IAM roles), and document ownership and purpose for each remaining account.

Step 2 — Deploy a PAM solution and integrate with your identity provider

Select a PAM approach that meets your budget and maturity: hosted SaaS for small orgs (Delinea, BeyondTrust, CyberArk Cloud) or open-source/self-managed (HashiCorp Vault + Teleport or Vault + jump-host). Key technical capabilities required: a credential vault, session broker/jump server, just-in-time (JIT) access, automatic credential rotation, and an API for integration. Integrate PAM with your IdP (Azure AD, Okta, or AD FS) using SAML or OIDC for single sign-on and with LDAP/RADIUS for network devices. Example: configure SAML between Azure AD and your PAM vendor, map Azure AD groups (PrivilegedAdmins) to PAM roles, and enforce conditional access at the IdP so MFA is required to authenticate to the PAM portal.

Step 3 — Enforce MFA upstream and at the session broker

Do not rely on passwords alone. Enforce MFA at the IdP for any account that can access the PAM portal or privileged systems. Use phishing-resistant factors where feasible (FIDO2/WebAuthn, hardware tokens like YubiKey) for high-risk privileged users; fallback can be TOTP or push-notification. For remote sessions, require MFA when accessing the jump host, VPN, or PAM session broker. Example small-business setup: Azure AD Conditional Access requires MFA for the "PrivilegedAdmins" group; the PAM gateway only accepts SAML sessions from that IdP and additionally prompts for a second factor (e.g., hardware token or OTP). For legacy systems that only accept RDP/SSH, use the PAM broker to proxy sessions so credentials never touch the user's endpoint and session start requires MFA.

Step 4 — Enforce least privilege, JIT access, and credential hygiene

Implement role-based access control (RBAC) inside PAM: give users only the minimum set of privileged operations for their role. Configure JIT access with approval workflows and time-bound access windows (e.g., 4-hour session). Enable automatic credential rotation (on check-in/check-out or after each session) for shared accounts and service accounts where possible. Technical example: store Windows local admin passwords in the PAM vault, rotate them automatically after a session ends using an agent or API call, and record the old/new password change in the vault audit trail. For cloud environments, prefer short-lived credentials via federation (AWS STS, Azure Managed Identities) instead of long-lived secrets.

Step 5 — Session monitoring, logging, and integration with your SIEM

Record privileged sessions (video or command logging), capture full audit trails (session start/stop, user identity, MFA result, approvals), and stream logs to your SIEM for retention and alerting (Splunk, Elastic, or a managed log provider). Technical guidance: forward PAM syslog/audit events over TLS to your SIEM; store session recordings encrypted (SSE) in an access-controlled bucket; enforce retention policies consistent with your compliance requirements. Configure alerts for risky events: multiple failed MFA attempts, session bypass attempts, unusual after-hours privileged access, and credential rotation failures.

Operational controls, break-glass, and testing

Define a documented "break-glass" emergency access process — e.g., a one-time token or emergency account that requires multi-person approval and generates immediate alerts. Test your control by running tabletop and live exercises: simulate a compromised admin account and verify that PAM + MFA prevents lateral movement and that logs show the event. Keep runbooks for onboarding/offboarding privileged users, periodic reviews of privileged access (quarterly), and evidence collection for audits (screenshots of group membership, IdP conditional access policies, PAM configuration exports).

Risk of non‑implementation and compliance impact

Failing to implement PAM and MFA for privileged access significantly increases the risk of account takeover, lateral movement, and exfiltration of CUI — outcomes that can lead to contract loss, regulatory penalties, and reputational damage. For small businesses holding DoD contracts, inability to demonstrate these controls can result in failed CMMC assessments. From a technical view, unprotected privileged accounts are an easy pivot point for attackers; from a compliance view, missing logs or auditable processes is grounds for non-compliance findings.

Practical tips, best practices, and summary

Start small and iterate: for a small organization, deploy a SaaS PAM integrated with your IdP, require MFA for all privileged users, and enforce automatic rotation and session brokering for the top 10 privileged accounts first. Maintain evidence: keeper-of-records for inventories, screenshots of PAM policies and MFA enforcement rules, and SIEM-retained logs. Use phishing-resistant MFA where possible, prefer short-lived cloud credentials, and automate as much of the rotation and approval workflow to reduce human error. In summary, combining PAM (vaulting, JIT access, session brokering, rotation) with strong MFA and logging provides a practical, auditable path to meet AC.L2-3.1.15: it closes the common privileged-access gaps attackers exploit and produces the artifacts auditors and assessors expect to see.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes