EXECUTIVE BRIEF
Access Control (AC) is one of the 14 security domains that defense contractors must implement to achieve CMMC Level 2 Certification. This domain has 22 associated security controls that will be tested during their assessment. Here is what defense contractors need to know:
Dig deeper and continue learning below!
Among the 14 key control families identified in NIST SP 800-171, access control (AC) is one of the most critical. This guide examines the access control requirements for Cybersecurity Maturity Model Certification (CMMC)—particularly for Level 2 certification—along with their practical implementation and how they align with broader compliance standards. By the end, you'll clearly understand how to meet these requirements and protect sensitive data.
Access control refers to the policies, procedures, and mechanisms limiting access to systems, networks, and data to authorized individuals only. Its primary goal is to prevent unauthorized access to sensitive systems and information. For organizations operating in the Defense Industrial Base (DIB), implementing a strong access control framework is essential for protecting Controlled Unclassified Information (CUI), maintaining compliance, and securing your standing with the Department of Defense (DoD).
CMMC’s access control standards are derived directly from NIST SP 800-171A Rev2. For businesses pursuing CMMC Level 2 compliance, adhering to all 22 objective-level requirements tied to access control (alongside other domain practices) is mandatory.
The CMMC framework applies to Department of Defense (DoD) contractors and subcontractors that handle FCI or CUI. Not all DoD vendors require CMMC certification—it depends on contract requirements and data sensitivity.
Compliance requirements are based on whether an organization handles FCI, CUI, or other sensitive information:
Most defense contractors will navigate CMMC Level 2, which requires the full implementation of the 22 access control practices laid out in NIST SP 800-171.
The CMMC Level 2 assessment guide outlines 22 distinct access control practices. Below is a detailed breakdown of these requirements from AC.L2-3.1.1 through AC.L2-3.1.22.
Control ID |
Control Name |
Overview |
AC.L2-3.1.1 |
AUTHORIZED ACCESS CONTROL [CUI DATA] |
Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems). |
AC.L2-3.1.2 |
TRANSACTION & FUNCTION CONTROL |
Limit system access to the types of transactions and functions that authorized users are permitted to execute. |
AC.L2-3.1.3 |
CONTROL CUI FLOW |
Control the flow of CUI in accordance with approved authorizations. |
AC.L2-3.1.4 |
SEPARATION OF DUTIES |
Separate the duties of individuals to reduce the risk of malevolent activity without collusion. |
AC.L2-3.1.5 |
LEAST PRIVILEGE |
Employ the principle of least privilege, including for specific security functions and privileged accounts. |
AC.L2-3.1.6 |
NON-PRIVILEGED ACCOUNT USE |
Use non-privileged accounts or roles when accessing non-security functions. |
AC.L2-3.1.7 |
PRIVILEGED FUNCTIONS |
Prevent non-privileged users from executing privileged functions and capture the execution of such functions in audit logs. |
AC.L2-3.1.8 |
UNSUCCESSFUL LOGON ATTEMPTS |
Limit unsuccessful logon attempts. |
AC.L2-3.1.9 |
PRIVACY & SECURITY NOTICES |
Provide privacy and security notices consistent with applicable CUI rules. |
AC.L2-3.1.10 |
SESSION LOCK |
Use session lock with pattern-hiding displays to prevent access and viewing of data after a period of inactivity |
AC.L2-3.1.11 |
SESSION TERMINATION |
Terminate (automatically) a user session after a defined condition. |
AC.L2-3.1.12 |
CONTROL REMOTE ACCESS |
Monitor and control remote access sessions. |
AC.L2-3.1.13 |
REMOTE ACCESS CONFIDENTIALITY |
Employ cryptographic mechanisms to protect the confidentiality of remote access sessions. |
AC.L2-3.1.14 |
REMOTE ACCESS ROUTING |
Route remote access via managed access control points |
AC.L2-3.1.15 |
PRIVILEGED REMOTE ACCESS |
Authorize remote execution of privileged commands and remote access to security-relevant information. |
AC.L2-3.1.16 |
WIRELESS ACCESS AUTHORIZATION |
Authorize wireless access prior to allowing such connections. |
AC.L2-3.1.17 |
WIRELESS ACCESS PROTECTION |
Protect wireless access using authentication and encryption. |
AC.L2-3.1.18 |
MOBILE DEVICE CONNECTION |
Control connection of mobile devices. |
AC.L2-3.1.19 |
ENCRYPT CUI ON MOBILE |
Encrypt CUI on mobile devices and mobile computing platforms. |
AC.L2-3.1.20 |
EXTERNAL CONNECTIONS [CUI DATA] |
Verify and control/limit connections to and use of external systems. |
AC.L2-3.1.21 |
PORTABLE STORAGE USE |
Limit use of portable storage devices on external systems. |
AC.L2-3.1.22 |
CONTROL PUBLIC INFORMATION [CUI DATA] |
Control CUI posted or processed on publicly accessible systems. |
These policies ensure controlled access, protect sensitive data, and allow for audit-friendly recordkeeping.
ISI Insight: Clearly defined categories for access control make compliance implementation more structured and manageable. Tools like Identity and Access Management (IAM) systems can automatically handle many of these requirements.
While all 22 practices are critical, the following measures stand out for their impact on compliance and security.
Access control under CMMC mandates the adoption of the least privilege principle. This means employees and users should only access the systems and data necessary to perform their job duties—nothing more.
Why it’s essential:
ISI Insight: Assign roles and permissions based on job functions within your organization. Partner systems like Role-Based Access Controls (RBAC) help streamline this process. Review access permissions regularly to confirm they remain relevant.
With remote work becoming the norm, securing remote access pathways to internal systems is a non-negotiable requirement. Remote sessions often introduce vulnerabilities that hackers target aggressively.
Why it’s essential:
ISI Insight: Encrypted Virtual Private Networks (VPNs) should be used for remote traffic, and endpoint detection solutions should be applied to scan device security. Ensure MFA covers remote access, too.
Session management controls ensure users are properly authenticated and that their access is terminated either when they’re inactive or when it’s unnecessary.
Why it’s essential:
ISI Insight: Enable session timeouts in all user-access systems after a predefined period of inactivity. This precaution ensures that forgotten login sessions won’t remain exposed.
Under CMMC guidelines, encryption of sensitive data in transit and at rest is a core mandate. However, data and communication protection extends beyond encryption to include secure access methods for stored CUI.
Why it’s essential:
ISI Insight: Encryption processes should use Advanced Encryption Standard (AES) algorithms with a minimum of 256 bits. Also, when storing or transmitting CUI, FIPS Validated encryption must be used.
Effectively monitoring user access and generating audit logs is instrumental in detecting personnel security incidents. These measures ensure any suspicious behavior is flagged and investigated proactively.
Why it’s essential:
ISI Insight: Use Security Information and Event Management (SIEM) tools to automate log reviews and correlate activities to detect risk better. Maintain records for set periods to comply with audits.
One underappreciated threat vector is the use of personal hardware or unapproved external storage devices. Access control requirements emphasize the need for strict control and monitoring of device connections to prevent data breaches.
Why it’s essential:
ISI Insight: Use endpoint management tools to regulate device connections. Disable USB ports where possible and maintain an inventory of approved external devices for CUI transfer.
Strong access control practices not only ensure compliance but also build trust with the DoD, improving your competitive edge in contract bids.
Implementing robust access controls presents several challenges, including:
To meet CMMC standards and secure your organization's sensitive information, defense contractors should follow these best practices for access control implementation.
The path to access control compliance under CMMC requires a strategic approach. Follow these actionable steps to ensure your organization is prepared to meet the standards at CMMC Level 1, Level 2, or beyond.
Evaluate your existing access control practices to identify gaps with CMMC requirements. This includes reviewing processes for managing user accounts, tracking access activities, and applying the least privilege principle.
Establish clear access control policies and procedures based on identified gaps. Make these policies a part of your System Security Plan (SSP) to ensure they’re well-documented for risk assessments.
Adopt IAM systems, MFA solutions, and other cybersecurity tools to automate and enforce access control measures. For example, implementing session locks and encryption ensures compliance with access-related security controls.
Provide ongoing education for all employees, reinforcing the importance of compliance with access policies. Address topics such as the secure use of external systems, how to identify vulnerabilities, and how employees can help safeguard sensitive data.
Regularly assess and fine-tune access control systems to adapt to evolving threats and operational changes. Proactive monitoring helps maintain compliance and secure sensitive data.
Defense contractors will need a range of technologies to meet CMMC access control requirements. These include:
Implementing cybersecurity practices that meet CMMC requirements—or even exceed them—can be a significant competitive differentiator for your business. But navigating the complexities of CMMC compliance by yourself can be challenging. At ISI, we specialize in simplifying the compliance process for defense contractors. Our expert team provides hands-on assistance with developing access control policies, implementing security controls, and ensuring your organization continuously meets CMMC requirements.
Contact ISI today to learn how we can support your compliance and cybersecurity needs.
The four main types are discretionary access control (DAC), mandatory access control (MAC), role-based access control (RBAC), and attribute-based access control (ABAC). These models specify how access rights are assigned based on user identity, organizational roles, or specific rules.
This principle ensures that users are granted only the access necessary to perform their job functions. It minimizes the risk of accidental data breaches and unauthorized access to sensitive systems.
Non-compliance can result in several repercussions, including disqualification from bidding on future DoD contracts, loss of current contracts, financial penalties, heightened security risks, and reputational damage. Proactively pursuing compliance is a cost-effective way to safeguard your business.
All three CMMC levels require annual affirmations that involve auditing of your access control practices. On top of that, CMMC Level 2 requires a triennial audit of your practices by a CMMC Third-Party Assessor Organization (C3PAO), and Level 3 requires a triennial audit by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).