Contact us at (571) 408-8810 • Authorized C3PAO • CMMC L2 Certified • GTIA Trustmark Assured Status

CMMC Compliance Services

Confidently navigate the CMMC process

Assessments for Contractors

Mock assessments, pre-assessments, readiness assessments or CMMC Level 2 Assessments.

Assessments for MSPs

Get yourself, and your clients, CMMC ready.

CMMC Compliant Managed IT

Stay secure, compliant, and operational with DIB focused managed IT services.

Our Company

Learn about our mission and company history.

Our Process

A simple, transparent, and proven path to CMMC readiness.

Why Choose Resilient IT?

We're mission oriented, focused on building resilient technology, compliance, and cybersecurity solutions.

Proper Implementation of AC.L1-3.1.1 – A Dual Perspective from a CMMC Assessor and Consultant

Written by Kevin Mann

July 14, 2025

Access control is one of the foundational pillars of cybersecurity, especially within Cybersecurity Maturity Model Certification (CMMC). At Level 1, AC.L1-3.1.1 states:

“Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).”

On the surface, this may seem like a basic control, but as both a Certified CMMC Assessor (CCA) and CMMC Consultant, I’ve seen how organizations often under- or over-engineer this practice. Let’s dive into what proper implementation really looks like—not just for compliance, but for operational security.

✅ Assessment Objective Breakdown (From the CMMC Assessment Guide)

Per the CMMC Level 1 Assessment Guide, the assessment objectives (AOs) for AC.L1-3.1.1 are:

  • [a] Identify information system users.
  • [b] Identify processes acting on behalf of authorized users.
  • [c] Identify devices that access the information system.
  • [d] Limit system access to the identified and authorized users, processes, and devices.

🧭 Consultant Perspective: Getting the Implementation Right

As a CMMC consultant, our goal is to help clients operationalize these controls in a way that fits their environment—especially small to mid-sized defense contractors (OSCs). Here’s how we coach clients to meet each assessment objective:

[a] Identify Users

  • Use centralized identity management (e.g., Active Directory or Microsoft Entra ID).
  • Maintain a user inventory or access roster.
  • Ensure each user is assigned unique credentials (no shared accounts).

[b] Identify Processes Acting on Behalf of Users

  • Document automated scripts, system accounts, and service accounts.
  • Assign ownership for each process and ensure they have least-privilege access.

[c] Identify Devices

  • Maintain an up-to-date asset inventory (including BYOD if applicable).
  • Implement device enrollment policies (e.g., through MDM or GPO).

[d] Limit Access

  • Use access control lists, group policies, and firewalls to enforce access limitations.
  • Ensure onboarding/offboarding processes update access rights promptly.
  • Disable unused accounts and remove orphaned devices.

We recommend lightweight tools like Microsoft Intune, free asset discovery tools, and policy documentation templates to keep costs and complexity down.

🔍 Assessor Perspective: What Compliance Actually Looks Like

From an assessor’s point of view, implementation must be verifiable, consistent, and operational.

Here’s what I look for during an assessment:

  • Policy/Procedure Evidence: Even though Level 1 doesn’t require formal documentation, some form of written procedure improves consistency.
  • System Demonstration: Can the organization show access lists, user accounts, and device access logs?
  • Interviews: Do employees understand who is authorized to access which systems and how that access is managed?
  • Screenshots or Live Evidence: Show me the Active Directory OU structure, user properties, and login logs.

🛑 Common Pitfall: Organizations often assume using passwords or having a domain means they’re compliant. But without evidence of authorization, account management, and device identification, this control fails.

Final Thoughts

AC.L1-3.1.1 is the gateway control—if you can’t control who gets in, nothing else matters. When implemented properly, it forms the bedrock of a compliant and secure environment. The key is clarity in who, what, and how access is authorized—and being able to show that to an assessor.

Whether you’re preparing for a CMMC assessment or helping clients as a consultant, this control deserves thorough and practical implementation.

🔗 Want to Learn More?

Let’s connect to talk more about proper CMMC practices and how to prepare effectively for your Level 2 assessment.

You May Also Like…