

For small federal contractors, achieving Cybersecurity Maturity Model Certification (CMMC) Level 1 is more than a regulatory checkbox - it's a critical step to securing Department of Defense (DoD) contracts and safeguarding sensitive Federal Contract Information (FCI). As cybersecurity requirements evolve, even modest organizations must demonstrate basic cyber hygiene to remain eligible and competitive in the contracting landscape. While the compliance framework can appear complex, the foundational practices required at Level 1 are practical, achievable, and essential for protecting contract data against common threats.
This guide offers a clear, step-by-step roadmap tailored specifically for small businesses with limited cybersecurity resources. By breaking down the required controls, documentation expectations, and frequent challenges into manageable actions, it aims to demystify the compliance process. With an emphasis on real-world application, it provides small contractors a reliable framework to build confidence, ensure audit readiness, and sustain compliance over time.
CMMC Level 1 focuses on one thing: basic protection of Federal Contract Information (FCI). FCI is information provided by the federal government, or generated for the government under a contract, that is not meant for public release. It includes items such as internal project emails, draft reports, non-public statements of work, or pricing details attached to a task order.
Even if a contractor never touches Controlled Unclassified Information (CUI), protecting FCI is mandatory. Once FCI sits in email, on laptops, in cloud storage, or on shared drives, DoD contractor cybersecurity requirements apply to that environment. Level 1 is designed as a floor: basic practices that any contractor handling federal work is expected to follow.
The 17 practices at Level 1 come directly from FAR 52.204-21 and fall into a few practical themes that match a typical small business IT setup:
These practices form basic cyber hygiene: routine behaviors and safeguards that reduce the chance that common threats, such as phishing, lost laptops, or commodity malware, lead to exposure of FCI. For most small contractors, implementing the 17 requirements means formalizing what should already be happening on office desktops, laptops, email, and common cloud tools instead of relying on informal habits.
The 17 CMMC Level 1 practices map to six basic areas: access control, identification and authentication, media protection, physical protection, system maintenance, and incident handling. The steps below assume a small environment that relies on common tools such as email, cloud file storage, and a handful of laptops or desktops.
AC.L1-3.1.1 - Limit information system access to authorized users, processes, or devices
Define who is allowed to handle Federal Contract Information and where they do that work. Create a simple list of users, their roles, and the systems they use for contract work. Use individual accounts on laptops, email, and shared drives, and remove any shared generic logins. On cloud platforms, assign basic roles (for example, standard user vs. admin) and avoid giving admin rights to staff who only need to read or edit documents.
AC.L1-3.1.2 - Limit users to the types of transactions and functions they are authorized to perform
Once roles are defined, align permissions with job duties. Staff who draft or edit proposals need write access; others may only need read access. Configure folders that contain FCI so only contract staff and managers can reach them. On cloud services, restrict admin consoles to a small set of trusted personnel. Document these role definitions in a short access control procedure so you have a reference during assessments.
AC.L1-3.1.20 - Verify and control external connections
Identify all ways your systems connect outside the organization. That typically includes your internet firewall or router, VPN connections, and any third-party tools that connect to your cloud storage. Ensure the router or firewall is configured with a unique admin password and that remote administration is either disabled or restricted to trusted addresses. Keep a basic inventory of these external connections and review it at least annually.
AC.L1-3.1.22 - Control public information system access
Keep FCI away from public websites or portals. Confirm that only designated content is published on public-facing sites and that these systems do not store non-public contract data in backend folders or form submissions. Disable directory browsing and remove any test or staging content that includes contract details.
IA.L1-3.5.1 - Identify users and associate them with system accounts
Every account should map to a named person. Turn off default or vendor accounts where possible, or lock them down with strong credentials and minimal rights. Maintain a user account register that lists each user, their username, and what systems they access. Use this list when onboarding and offboarding staff to ensure you add and remove accounts consistently.
IA.L1-3.5.2 - Authenticate users before authorizing system access
Enforce login prompts on all devices and key applications. Configure password policies in your directory service or cloud platform: strong length, complexity, and reasonable expiration. Do not allow devices that process FCI to auto-logon to user accounts. On shared workstations, require each person to sign in with their own credentials so activity is traceable.
MP.L1-3.8.3 - Sanitize or destroy media before disposal or reuse
Decide how you will handle laptops, external drives, and printed material when no longer needed. For digital media, use full-disk encryption during normal use, then perform a secure wipe before disposal or reuse. Many operating systems include a built-in reset function that removes data; use that before recycling or returning leased equipment. For printed FCI, cross-cut shredding is usually sufficient. Record these steps in a short media disposal procedure.
PE.L1-3.10.1 - Limit physical access to systems and facilities
Control where devices that process FCI reside. Lock office doors after hours, restrict server or network closets, and avoid leaving laptops unattended in open areas. For home offices, define a simple expectation that work devices are stored in a secure location when not in use. If visitors enter office space, ensure they do not have unsupervised access to computers or filing cabinets that hold contract material.
PE.L1-3.10.3 - Escort visitors and monitor visitor activity
Create a basic visitor practice: sign-in log, visible badges or stickers, and staff escorting non-employees in areas where systems or paperwork involving FCI are present. Keep visitor logs for a reasonable period so you can show physical access oversight during an assessment.
PE.L1-3.10.4 - Maintain physical access logs as appropriate
For small offices, the visitor sign-in sheet often serves as the primary physical access record. If you use an electronic badge system or building access logs from a landlord, retain copies or export reports on a scheduled basis. The key point is being able to show who had authorized physical access over time.
SC.L1-3.13.1 - Monitor, control, and protect organizational communications at external boundaries
Use a firewall or router with basic security features between your internal network and the internet. Enable its logging function and keep the default rule set that blocks unsolicited inbound traffic. If a managed router from an internet provider is in use, confirm that firewall features are turned on. Document which device serves as your boundary protection and where its configuration is stored.
SC.L1-3.13.5 - Implement subnetworks for publicly accessible system components
If you host any public-facing systems, place them on a separate network segment from internal workstations that store FCI. Often this is handled by your internet provider or hosting vendor; when that is the case, note the setup in a brief network description. For small offices without public servers, state that no public systems exist on the internal network, which still addresses the requirement.
SI.L1-3.14.1 - Identify, report, and correct information system flaws
Establish a routine for applying security updates to operating systems, applications, and network devices. Enable automatic updates where stable and schedule a monthly review for any remaining patches. When a vendor releases an urgent security fix, install it during the next feasible maintenance window. Keep a simple log that records patch dates for key systems.
SI.L1-3.14.2 - Provide protection from malicious code
Install reputable antivirus or endpoint protection on all laptops, desktops, and servers that process FCI. Configure scans to run regularly and ensure real-time protection stays enabled. Periodically confirm that definitions are updating and that alerts are reviewed, even if this is just a quick weekly check by a designated staff member.
SI.L1-3.14.4 - Update malicious code protection mechanisms
Configure automatic updates for antivirus engines and signatures. Where internet access is limited, schedule manual updates and record completion. During an assessment, being able to show that these tools stay current is as important as having them installed.
SI.L1-3.14.5 - Perform periodic scans and real-time scans of files from external sources
Ensure email attachments and downloaded files are scanned by your endpoint protection before opening. Keep the default real-time scan settings enabled and schedule full system scans at least monthly. Instruct staff not to disable protection to speed up downloads or installations, and reinforce this expectation in a short acceptable use guideline.
MA.L1-3.7.5 - Provide controls on tools used for system maintenance
Limit who can perform system maintenance tasks such as installing software, configuring devices, or running diagnostic utilities. Administrative rights should belong only to staff who handle support duties or trusted external providers. When outside technicians perform work, supervise their access where possible and change temporary passwords afterward.
IR.L1-3.6.1 - Establish an operational incident-handling capability
Define what counts as a security event worth reporting: suspicious emails, lost or stolen devices, unexpected software installations, or signs of unauthorized access. Document a short response playbook that explains who to notify, how to contain the issue, and how to preserve basic evidence such as logs or screenshots. Train staff on this process during onboarding and refresh it periodically so they understand their role.
Treat these steps as a small set of repeatable routines rather than one-time tasks. When they are written down, assigned to responsible roles, and followed on a schedule, they not only meet the CMMC Level 1 practices but also position the organization for a smoother assessment and easier reuse of the same structure if higher levels are needed later.
CMMC Level 1 has only 17 practices, but assessors still expect clear, consistent documentation. The goal is not a binder of theory; it is a small, accurate record of how the environment actually works.
Start from what already exists: HR checklists, IT tickets, cloud admin screens, or vendor invoices often contain needed details. Formalize these into one- or two-page procedures tied to the relevant practice (for example, attach your user onboarding steps to AC.L1-3.1.1 and IA.L1-3.5.1). Use simple version control: a date, an owner, and a short change note.
For each practice, aim to show both what you intend to do (policy or procedure) and what you actually did (evidence). Evidence usually includes configuration screenshots, exported reports, sample tickets, or completed logs from the past few months.
Keeping documents current, aligned with real practices, and organized by control turns the paperwork from a burden into a straightforward way to demonstrate that the environment is assessment-ready.
Most small contractors struggle not with the 17 practices themselves, but with how they apply in their specific environment. Certain patterns show up repeatedly during CMMC Level 1 readiness work.
A common mistake is assuming only one system or contract team falls under scope. Once Federal Contract Information touches email, cloud storage, laptops, or shared drives, those components become part of the assessed environment. Leaving personal devices, side projects, or "temporary" storage out of scope leads to gaps.
Start by mapping where FCI actually lives and moves: inboxes, shared folders, collaboration tools, and backups. Treat that map as the boundary for your Level 1 work and keep it updated when tools or vendors change.
Another pitfall is assuming that having tools in place is enough without matching procedures. Assessors look for a clear chain from control to process to evidence. When password settings, backup routines, or visitor handling differ from what documents describe, credibility drops quickly.
Keep procedures short and operational. Write down what people already do, then adjust weak steps rather than drafting idealized processes no one follows.
Level 1 does not require formalized training programs, but it does expect that staff know their basic responsibilities. Many incidents stem from simple user actions: clicking a phishing link, copying FCI to personal storage, or ignoring suspicious behavior.
Integrate quick security reminders into onboarding and periodic staff meetings. Reinforce three or four key behaviors: how to report issues, where FCI is allowed, how to handle removable media, and expectations for home offices.
The annual leadership affirmation is often treated as a one-time attestation. Signing without verifying that routines still operate sets the stage for unpleasant surprises at assessment time.
Use the affirmation as a yearly checkpoint. Validate that core tasks still run on schedule: patching, backups, user reviews, antivirus updates, and visitor logging. When small changes occur during the year - new staff, new laptops, a different cloud service - update both procedures and evidence. Consistency over time is what shows that CMMC Level 1 is a working program, not a paperwork exercise.
Once the practices and documentation are clear, the next question is how to manage the workload. For CMMC Level 1 compliance, a mix of self-service tools, public resources, and targeted expert support usually works best.
Free and low-cost self-assessment tools give structure to internal efforts. Examples include:
Government resources add important context. Public guidance on CMMC compliance for defense contractors, NIST 800-171, and small-business cybersecurity explains intent, provides sample language, and clarifies terms. Templates from these sources are useful starting points, but they still need to be tailored so they match actual tools and routines.
Automated platforms compress data collection and generate quick reports. They are efficient for capturing inventories, exporting configurations, and tracking gaps over time. Their limitation is judgment: they flag whether a setting exists, not whether it fits the risk profile, contract flow, or assessor expectations.
This is where practitioner-led consulting services such as Genesis Risk & Compliance Group, LLC change the equation. An experienced advisor interprets requirements in context, designs lean procedures around your real workflows, and aligns evidence so it tells a coherent story. That support streamlines readiness assessments, shores up documentation, and reduces surprises during formal reviews.
The most effective approach pairs internal ownership of daily practices with selective expert guidance on scoping, control interpretation, and audit preparation. Treat outside advisory as a strategic asset that reduces rework, compresses timelines, and lowers the risk of failed or delayed certification.
Achieving CMMC Level 1 compliance is a disciplined process that demands a clear understanding of each control, thoughtful implementation, and thorough documentation tailored to your specific environment. For small federal contractors, this stepwise approach lays a solid foundation to protect Federal Contract Information effectively while preparing for a successful assessment. By focusing on practical cybersecurity hygiene, maintaining accurate records, and addressing common pitfalls like scope errors and inconsistent procedures, contractors can confidently meet DoD requirements without unnecessary complexity. With over 15 years of hands-on experience, Genesis Risk & Compliance Group, LLC offers expert guidance that translates regulatory frameworks into actionable, real-world steps. Our practitioner-led approach ensures your compliance efforts align with assessor expectations and operational realities. Explore how partnering with seasoned advisors can streamline your readiness journey, safeguard your contracts, and position your organization for continued success in the federal marketplace.