Access Control Policy
Access Control Domain (AC)
📖 What This Policy Covers
Access Control is the foundation of your security program -- it answers the question 'who can access what, and under what conditions?' This policy covers user authorization, least privilege, account lifecycle management, privileged accounts, remote access, wireless access, mobile devices, network segmentation, and data access controls. Think of it as the comprehensive rulebook for every door, gate, and lock in your digital environment.
Purpose
This policy ensures that only authorized individuals can access systems and data, access is granted based on job function and need-to-know, CUI is protected from unauthorized disclosure or modification, and the organization meets CMMC Level 2 certification requirements.
Scope
Applies to all information systems, networks, applications, and databases that process, store, or transmit CUI or sensitive data. Covers all employees, contractors, vendors, partners, and third parties with system access across cloud (AWS, Azure, GCP), on-premise, hybrid, and remote access environments.
🎯 Why It Matters
Unrestricted access is a top cause of data breaches -- 80% of breaches involved compromised credentials (Verizon DBIR 2022). A single unauthorized user or device can expose CUI, costing $180 per record in remediation (IBM). The DoD requires this because defense contractors are prime targets for foreign actors exploiting weak access controls. With 22 practices, Access Control is the largest CMMC domain, reflecting how fundamental it is to protecting sensitive information.
🔐 Key Requirements
1. User Access Control
All access must be authorized before provisioning. Users receive the minimum access required for their job function (least privilege). Public-facing systems prohibit CUI storage/processing.
- ✓ Access requests submitted via ticketing system, approved by manager + data owner + IT Security (for privileged access)
- ✓ No shared accounts -- every user has unique credentials
- ✓ No generic accounts (e.g., 'admin', 'support') except documented service accounts
- ✓ Temporary elevated access expires automatically after 48 hours or 7 days
- ✓ Quarterly access reviews to remove unnecessary permissions
- ✓ External users require MFA + VPN with device compliance check + time-limited access (max 90 days)
2. Account Management
Full lifecycle management of accounts from provisioning through deprovisioning, with special controls for privileged and service accounts.
- ✓ New accounts created within 48 hours of approved request with default read-only access
- ✓ MFA enrollment mandatory before first login
- ✓ Role changes trigger access review within 5 business days
- ✓ Terminations: account disabled within 1 hour of HR notification
- ✓ Inactive accounts (90+ days) disabled automatically; deleted after 180 days
- ✓ Privileged users get separate admin accounts (e.g., 'jsmith' and 'jsmith-admin')
- ✓ Admin accounts cannot be used for email/web browsing
- ✓ Service accounts documented with purpose, owner, permissions; credentials stored in vault
- ✓ Just-In-Time (JIT) provisioning preferred over standing admin access
3. Authentication & Session Controls
Password requirements, multi-factor authentication, and session management to prevent unauthorized access.
- ✓ Minimum password length: 14 characters with upper, lower, number, special character
- ✓ Password expiration: 90 days (120 days for cloud with MFA)
- ✓ Password history: last 12 cannot be reused
- ✓ Account lockout: 5 failed attempts triggers 30-minute lockout
- ✓ MFA required for all cloud console access, VPN, privileged accounts, and CUI access from external networks
- ✓ Idle timeout: 15 minutes of inactivity
- ✓ Maximum session: 10 hours before re-authentication
- ✓ Concurrent sessions limited to 3 per user
4. Access Monitoring & Enforcement
Continuous monitoring of access attempts, regular access reviews, and separation of duties enforcement.
- ✓ All access attempts logged: successful logins, failed attempts, privilege escalations, privileged commands
- ✓ Logs retained 1 year (CUI systems: 3 years)
- ✓ Real-time alerts for: multiple failed logins (>3 in 5 min), unusual location, after-hours privileged access
- ✓ Quarterly access reviews by managers (user lists), IT (group memberships), CISO (privileged accounts)
- ✓ Annual recertification of all access
- ✓ Separation of duties: developer != production deployer, IT admin != financial system access, approver != implementer
5. Device Access Control
Controls for authorized devices, endpoint requirements, and mobile device management.
- ✓ Company-issued laptops/desktops fully managed; MDM-enrolled BYOD allowed if compliant
- ✓ Personal devices not enrolled in MDM are prohibited
- ✓ Endpoint protection required: antivirus/EDR (CrowdStrike, Defender ATP)
- ✓ Full-disk encryption required (BitLocker, FileVault)
- ✓ Critical patches within 7 days, other patches within 30 days
- ✓ MDM policies enforce: PIN/biometric lock, 5-min inactivity lock, remote wipe capability, jailbreak/root prohibition
6. Network Access Control
Network segmentation, remote access controls, wireless security, and third-party connection management.
- ✓ CUI systems isolated in separate VLAN/subnet with firewall rules restricting inter-segment traffic
- ✓ Remote access requires company-managed device or MDM-enrolled BYOD, VPN with split-tunneling disabled, MFA, TLS 1.2+
- ✓ Jump servers/bastion hosts for admin access
- ✓ Guest WiFi isolated with no CUI access; corporate WiFi uses WPA3-Enterprise with certificate-based auth
- ✓ Third-party access: time-limited (90 days max), role-based, logged/monitored, NDA required
- ✓ API keys rotated every 90 days, stored in vault
7. Data Access Control
Data classification-aligned access permissions and encryption requirements.
- ✓ Access permissions aligned with data classification: Public, Internal, Confidential, CUI
- ✓ CUI access requires: completed CUI training, background check, signed NDA, manager + CISO approval
- ✓ Data at rest: AES-256 encryption
- ✓ Data in transit: TLS 1.2+ for external, TLS 1.2+ or IPsec for internal
- ✓ Encryption keys managed via KMS (AWS KMS, Azure Key Vault)
👥 Roles & Responsibilities
CISO / IT Director
- • Overall accountability for access control program
- • Approve exceptions to this policy
- • Ensure annual policy review and updates
- • Report compliance status to executive leadership
IT Department / System Administrators
- • Implement technical controls per this policy
- • Provision and revoke access based on approved requests
- • Monitor access logs and investigate anomalies
- • Maintain evidence of compliance for audits
Human Resources (HR)
- • Notify IT within 24 hours of employee status changes (hire, transfer, termination)
- • Maintain records of background checks and clearances
- • Coordinate access approval for new hires
Managers / Supervisors
- • Request access for direct reports based on job function
- • Review team member access quarterly
- • Report suspected unauthorized access immediately
All Users
- • Protect credentials (no sharing, secure passwords)
- • Report lost/stolen devices within 1 hour
- • Complete annual security awareness training
- • Use access only for authorized business purposes
🛠️ Implementation Roadmap (8 Weeks)
Foundation
Weeks 1-4- → Week 1: Inventory all systems accessing CUI, list all users with current access levels, identify gaps vs. policy, assign implementation owners
- → Week 2: Configure IAM (Azure AD / AWS IAM / GCP IAM), create role-based groups, audit Active Directory structure, define GPOs for password policies
- → Week 3: Select and pilot MFA vendor (Microsoft Authenticator, Duo, Okta), create user training materials, enforce MFA for cloud admins then all users
- → Week 4: Implement MDM (Intune, JAMF), enroll all company devices, configure compliance policies (encryption, AV, OS version), deploy endpoint protection
Advanced Controls
Weeks 5-8- → Week 5: Inventory privileged accounts, implement PAM solution (CyberArk, BeyondTrust, Azure PIM), convert standing admin to JIT, enable session recording
- → Week 6: Centralize logs (Splunk, Azure Sentinel, AWS Security Hub), configure log sources, create alert rules, assign on-call rotation
- → Week 7: Export current access reports, assign reviewers, use access review tool, document results, revoke unnecessary access
- → Week 8: Finalize policy, create evidence folder structure, conduct training (all users, IT staff, managers), publish policy, require acknowledgment
Recommended Tools
📊 CMMC Practice Mapping
| Practice ID | Requirement | Policy Section |
|---|---|---|
| AC.L1-3.1.1 | Limit system access to authorized users | 1, 2 |
| AC.L1-3.1.2 | Control public information system access | 1 |
| AC.L2-3.1.3 | Control CUI flow | 7 |
| AC.L2-3.1.4 | Separate duties | 2, 4 |
| AC.L2-3.1.5 | Least privilege | 1 |
| AC.L2-3.1.6 | Use non-privileged accounts | 2 |
| AC.L2-3.1.7 | Limit privileged functions | 2 |
| AC.L2-3.1.8 | Limit unsuccessful logon attempts | 3 |
| AC.L2-3.1.9 | Provide privacy/security notices | Separate policy |
| AC.L2-3.1.10 | Limit concurrent sessions | 3 |
| AC.L2-3.1.11 | Terminate sessions | 3 |
| AC.L2-3.1.12 | Control remote access | 6 |
| AC.L2-3.1.13 | Monitor remote access | 4 |
| AC.L2-3.1.14 | Route remote access via managed points | 6 |
| AC.L2-3.1.15 | Authorize wireless access | 6 |
| AC.L2-3.1.16 | Protect wireless access | 6 |
| AC.L2-3.1.17 | Authorize mobile devices | 5 |
| AC.L2-3.1.18 | Control mobile device connections | 5 |
| AC.L2-3.1.19 | Encrypt CUI on mobile devices | 5, 7 |
| AC.L2-3.1.20 | Control external system connections | 6 |
| AC.L2-3.1.21 | Limit portable storage use | See Media Protection Policy |
| AC.L2-3.1.22 | Control CUI posting/processing | 7 |
📋 Evidence Requirements
These are the artifacts a C3PAO assessor will ask for. Start collecting early.
Signed Access Control Policy
IAM Configuration Screenshots
Access Request Tickets
Access Review Reports
MFA Enrollment Report
Failed Login / Lockout Logs
Privileged Access Logs
Termination Audit Log
Device Compliance Report
Training Records
⚠️ Common Gaps (What Assessors Flag)
1. Shared or generic admin accounts still in use
2. MFA not enforced for all CUI access
3. No formal access review process
4. Terminated employee accounts not disabled within 1 hour
5. No separation of duties enforcement
📝 Template Customization Guide
When filling in the downloadable template for this policy, replace these placeholders with your organization's specifics:
[COMPANY NAME] Your organization's legal name
Example: Acme Defense Systems, LLC
[CISO Name] Name of your Chief Information Security Officer or IT Director
Example: Jane Smith
[MM/DD/YYYY] Effective date, review date, or next review date
Example: 03/01/2026
[ticketing system] Your IT service management tool for access requests
Example: Jira Service Desk
[Service Account Registry] Where you document service accounts
Example: SharePoint list at /sites/IT/ServiceAccounts
[[email protected]] Your security team email distribution
Example: [email protected]
Customization Tips
- 💡 Replace all bracketed placeholders with your organization-specific values
- 💡 Adjust timeframes (e.g., 48-hour access provisioning) based on your HR and IT capacity
- 💡 If you don't use certain tools (e.g., Azure PIM), replace with your equivalent (e.g., CyberArk)
- 💡 For small organizations, document where separation of duties isn't feasible and describe compensating controls
- 💡 Add your specific IP ranges, VPN endpoints, and network segment details to the network access section
- 💡 Review password policy thresholds -- 14 characters is the NIST recommendation, but your contracts may specify different requirements