🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Authorization Workflow that Satisfies FAR 52.204-21 / CMMC 2.0 Level 1 - Control - AC.L1-B.1.I: Policies, Procedures, and Automation

Step-by-step guidance to design an authorization workflow that meets FAR 52.204-21 and CMMC 2.0 Level 1 AC.L1-B.1.I, including policies, automation patterns, and small-business examples.

April 22, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to create a defensible, auditable authorization workflow that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I — focusing on written policies, repeatable procedures, and automation patterns a small business can implement immediately to control who gets access to systems and data.

Requirement and key objectives (Compliance Framework / Practice)

Under the Compliance Framework Practice, AC.L1-B.1.I requires a documented policy and procedures that govern authorization and access, together with practical automation to enforce and evidence that policy. Key objectives include (1) defining who can approve access, (2) enforcing least privilege, (3) demonstrating timely provisioning and deprovisioning, and (4) maintaining auditable logs and periodic attestation. Your artifacts should show both the “what” (policy) and the “how” (procedures + automation) for routine access lifecycle events.

Implementation notes for Compliance Framework

Begin by drafting an Authorization Policy that maps to the Compliance Framework Practice: scope (systems and data covered), roles (requester, manager, approver, IAM admin), approval rules (which roles may grant which access levels), and evidence retention windows. Complement this with a Procedure SOP that describes the step-by-step request, approval, provisioning, and deprovisioning workflows and the automation tools used (IdP, SCIM connector, ticketing system). Include decision trees for exceptions (emergency access, third-party contractors) and designate who performs quarterly attestation.

Technical implementation: identity, provisioning, and enforcement

Technical controls translate the policy into action. Use an Identity Provider (IdP) that supports SAML/OIDC for SSO and SCIM 2.0 for automated provisioning—examples: Okta, Azure AD, Google Workspace. Implement RBAC (role-based access control) with clearly defined role templates (e.g., Sales-Read, Dev-Deploy). For elevated access use time-limited Just-In-Time (JIT) provisioning or a Privileged Access Management (PAM) solution. Require MFA at the IdP layer and enforce session timeout policies (recommend 15–60 minutes for sensitive apps). Use automatic deprovisioning via SCIM when HR signals termination (integration with HR system or a simple webhook from your ticketing system) to ensure access is removed within your target SLA (commonly within 24 hours).

Small-business example: 20-employee services firm

Example: a 20-person consultancy uses Google Workspace for email, AWS for hosting, and a cloud CRM. Implementation steps: (1) Create an Authorization Policy stating who may approve CRM access (team lead + security designee). (2) Use Okta as IdP and configure SCIM to provision users to the CRM and AWS IAM Identity Center; map job titles to role templates. (3) Use a simple ServiceNow or JIRA request form that routes to the team lead; Okta Workflows then applies the role on approval and sends a ticket closure with provisioning evidence. (4) Configure a daily deprovisioning sync and ensure HR offboarding triggers deletion in Okta so accounts are disabled within 24 hours of termination. Capture screenshots of approvals and CSV exports of provisioning logs for evidence during audits.

Logging, monitoring, and evidence collection

To satisfy auditors, collect machine-readable evidence: IdP audit logs (user creation, role assignment, MFA events), SCIM provisioning logs, ticketing system approval records, and periodic attestation reports. Forward IdP logs and application audit events to a central SIEM or even a managed log storage (syslog + filebeat to a cloud log bucket) and retain them per your policy (typical retention: 1–3 years for contractual evidence). Create a simple quarterly attestation spreadsheet or automated report showing active roles, last access timestamps, and outstanding privileged accounts for manual review.

Risks of not implementing a proper authorization workflow

Failing to implement these controls introduces multiple risks: unauthorized access to covered contractor information and CUI, inability to demonstrate compliance during FAR or CMMC assessments, longer mean time to remediate after a departure or compromise, and potential contract loss or financial penalties. Operationally you also expose yourself to insider threats and accidental data exposure when least privilege is not enforced or deprovisioning is slow or manual.

Compliance tips and best practices

Practical tips: (1) Start small — automate one critical app first (e.g., email or CRM), then expand. (2) Keep policies concise and map each policy statement to the procedural step and the evidence artifact (e.g., “Manager approval” → ticket ID and approver signature). (3) Use SCIM for provisioning and a webhook from HR to trigger deprovisioning; if SCIM is unavailable, create a daily reconciliation script that compares HR roster to IdP and flags mismatches. (4) Document exceptions and require time-limited access with automated expiry; log emergency access and require post hoc approvals. (5) Run tabletop exercises quarterly to validate that the workflow, notifications, and automations operate as expected.

In summary, satisfying FAR 52.204-21 and CMMC 2.0 Level 1 control AC.L1-B.1.I is achievable for small businesses by writing clear authorization policies, codifying procedures, and implementing straightforward automation (IdP + SCIM + ticketing + logging). Prioritize least privilege, timely deprovisioning, and auditable evidence collection — do that and you'll both reduce operational risk and be prepared for compliance assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.