🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide to Meeting FAR 52.204-21 / CMMC 2.0 Level 1 - Control - PE.L1-B.1.IX: Control and Manage Physical Access Devices

Practical, step-by-step guidance for small contractors to control and manage physical access devices and meet FAR 52.204-21 and CMMC 2.0 Level 1 PE.L1-B.1.IX requirements.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to implement PE.L1-B.1.IX — Control and Manage Physical Access Devices — to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 expectations, offering a clear step-by-step approach, specific technical hardening tips, and small-business examples so you can build defensible evidence for audits.

Why controlling physical access devices matters

Physical access devices (badge readers, door controllers, kiosks, turnstiles, smart locks, and associated controllers) are the gatekeepers to spaces that may contain covered contractor information (CCI) or controlled unclassified information (CUI). If these devices are compromised—through default credentials, exposed management interfaces, or unmonitored ports—an attacker can gain unauthorized physical access to workspaces, servers, or removable media holding CCI/CUI. Beyond direct theft, unauthorized access can break chain-of-custody requirements, cause contract violations under FAR 52.204-21, and jeopardize CMMC certification.

Step 1 — Inventory and classification

Start with a complete inventory (make it part of your Configuration Management Database / asset register). Record device type, model, firmware version, network address (if IP-connected), physical location, badge reader protocol (Wiegand, OSDP), owner, vendor contact, date of purchase, and whether the device controls access to areas containing CCI/CUI. For a 20–50 person small contractor, a spreadsheet plus a dedicated "physical access" tab in your CMDB is usually sufficient. Mark devices that are legacy or unsupported so you can prioritize upgrades.

Step 2 — Policy, ownership, and lifecycle processes

Create a written policy for provisioning and decommissioning physical credentials and devices. Policy items must include: who can request badges, background-screening requirements (where applicable), the approval chain, required identification, how lost/stolen badges are reported and revoked, and retention of issuance logs. Hard requirements: enforce least privilege (temporary visitors receive time-limited credentials), immediate revocation for terminated employees, and documented chain-of-custody for any device removed for repair. Save issuance records and revocation logs as evidence for assessments.

Step 3 — Hardening and network controls (technical specifics)

Harden controllers and readers: change default passwords, disable unused admin protocols, and apply firmware updates on a scheduled cadence. Prefer OSDP Secure Channel (AES-128) over Wiegand where supported; if not available, isolate legacy Wiegand devices physically and logically. Put access-control hardware on a management VLAN with strict ACLs; use 802.1X or NAC to prevent rogue devices from connecting. Restrict admin interfaces to a jump box with MFA and certificate-based SSH/TLS. Configure devices to forward logs via syslog (use TLS if supported) to a central log collector or lightweight SIEM; enable NTP to ensure log timestamps are accurate. On switches, enable port-security, BPDU guard, and MAC sticky entries for switch ports connected to controllers.

Step 4 — Monitoring, logging, and incident handling

Log every credential issuance, swipe, failed entry, and administrative change. For a small business, set up a centralized syslog server (e.g., Rsyslog) or a cloud log ingestion service and retain logs for a baseline period (90 days recommended for investigations; retain longer if contractually required). Create automated alerts for unusual patterns, such as off-hours door opens, multiple failed swipes, or new device firmware changes. Your incident response playbook should include immediate badge revocation, locking affected doors in watchdog mode, collecting video evidence, and chasing post-incident forensic artifacts on access control endpoints.

Small-business example scenario

Example: A 30-person defense contractor uses a legacy Wiegand reader at the server room door and tablet-based badge issuance at reception. Implementable steps: (1) add Wiegand reader to the inventory and prioritize firmware and physical tamper checks; (2) place the server room controller on a dedicated management VLAN and restrict access to a single, auditable jump host; (3) change default controller credentials and log to a central syslog on the company’s RHEL jump box; (4) update reception tablet policy so new badges auto-expire after 30 days for visitors; (5) document the changes and store screenshots and policy revisions as audit artifacts.

Compliance tips and best practices

Keep pragmatic evidence: export configuration snapshots, show the asset inventory with timestamps, provide issuance and revocation logs, and keep a change-control ticket trail for firmware updates. Where possible choose cloud-managed badge systems (Kisi, Openpath, Envoy) if they reduce administrative burden and provide built-in logging—ensure the vendor contract includes right-to-audit and data protection clauses. Regularly perform a physical audit (quarterly or semi-annually) to confirm readers are present and tamper seals are intact. Train reception and facilities staff to follow the badge issuance policy and run a simple table-top exercise for lost-badge incidents.

Risks of not implementing this control

Failure to control and manage physical access devices exposes your company to theft of equipment, exfiltration of CCI/CUI, loss of contract eligibility, and formal findings during FAR and CMMC assessments. Technically, unsecured devices can be pivot points into enterprise networks (e.g., an IP-enabled controller with default admin credentials), enabling lateral movement and data access. Operationally, poor provisioning and decommissioning procedures mean revoked badges remain active, creating prolonged windows for abuse. Contractual and reputational harms can follow even a single avoidable incident.

Summary: Implementing PE.L1-B.1.IX is a manageable set of operational and technical tasks: inventory devices, codify policy and lifecycle procedures, harden hardware and networks, centralize logging, and train staff. For small contractors, prioritize legacy device isolation, enforce credential revocation, and retain clear evidence of controls and testing. Following the step-by-step actions and technical hardening guidance above will give you practical defensible evidence for FAR 52.204-21 and CMMC 2.0 Level 1 compliance while materially reducing the risk of unauthorized physical access.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes