Learn
What is CMMC? FAR 52.204-21 explained Your environment SPRS submission How it works Pricing FAQ Log in Get started

FAR is the regulation. 52.204-21 is the clause.

The Federal Acquisition Regulation — the FAR — is the body of rules governing how the United States government buys goods and services from contractors. It applies across every federal agency, not just the Department of Defense. When you bid on a federal contract, the FAR is the framework you're working under.

FAR 52.204-21 is one specific clause within the FAR. Its full title is "Basic Safeguarding of Covered Contractor Information Systems." It defines the minimum cybersecurity practices a contractor must implement when handling Federal Contract Information — anything not intended for public release that's provided by or generated for the government under a contract.

The clause is short — under three pages in the regulation itself. It lists 17 specific practices, each phrased as a one-sentence requirement. There's no extensive guidance, no technical specification document, no formal assessment methodology. It's just 17 things you must be doing.

17
Required practices
6
Practice families
2016
In effect since

CMMC Level 1 is FAR 52.204-21.

The Department of Defense didn't invent Level 1's requirements from scratch. The 17 practices that define CMMC Level 1 are the same 17 practices that have been in FAR 52.204-21 since 2016. CMMC adds the certification rhythm — annual self-assessment, senior-official affirmation, SPRS submission — but the technical requirements are the FAR clause.

This means a few practical things. First, FAR 52.204-21 has been a contractual requirement for federal contractors for nearly a decade — the practices aren't new. Second, your CMMC Level 1 obligations are concrete and bounded: 17 specific things, each clearly described in the regulation itself. Third, unlike CMMC Level 2 (which is built on a separate 110-control NIST standard), Level 1 has no underlying technical specification document — the practices are defined in plain English in the FAR clause.

If your contract includes the FAR 52.204-21 clause, you're already obligated to implement these practices. CMMC Level 1 is, in effect, the DoD's mechanism for verifying that you actually are.

Six families. Seventeen practices.

The 17 practices group into six thematic families. The grouping isn't from FAR 52.204-21 itself — the regulation just lists practices in order — but from the way DoD references them in the CMMC framework, using identifiers like AC.L1-3.1.1 (Access Control, Level 1, practice 3.1.1).

AC
Access ControlWho can use systems handling FCI, and what they can do
4
IA
Identification & AuthenticationUnique logins and verifying who's logging in
2
MP
Media ProtectionSanitizing or destroying media that held FCI
1
PE
Physical ProtectionLimiting physical access to systems and workspaces
4
SC
System & Communications ProtectionNetwork boundaries and isolation of public-facing systems
2
SI
System & Information IntegrityPatching, anti-malware, and scanning
4

Notice how compact the practice families are. Whole categories from CMMC Level 2 — audit logging, configuration management, incident response, risk assessment, security training — aren't represented at Level 1. The FAR clause was designed as a basic safeguarding floor, not a comprehensive cybersecurity program.

The 17 practices, in plain English.

Below is each FAR 52.204-21 (b)(1) practice, in the order it appears in the regulation, with a plain-English summary of what it actually requires. The full regulatory text is shorter than most software end-user agreements — but the implications run deeper than the wording suggests.

AC.L1-3.1.1
Limit access to authorized users
Only people you've specifically approved should be able to use the systems where FCI lives. Visitors, ex-employees, and outside parties shouldn't have access.
AC.L1-3.1.2
Limit access to authorized functions
Once someone has access, they should only be able to do what they need for their job. Don't give everyone admin rights or full access to everything.
AC.L1-3.1.20
Verify and control external system connections
Know which outside systems your information flows to — cloud apps, SaaS, vendor portals — and have some control over those connections, not just letting anyone connect to anything.
AC.L1-3.1.22
Control public information
Don't let FCI end up on your public website, social media, or other public-facing channels. Have someone check before things go live.
IA.L1-3.5.1
Identify users uniquely
Each person should have their own login — not a shared account. When something happens on a system, you need to be able to tell who did it.
IA.L1-3.5.2
Authenticate users before access
People should have to prove who they are before using a system — typically with a password, but it could be a PIN, badge, or other authentication. (Multi-factor isn't required at Level 1.)
MP.L1-3.8.3
Sanitize or destroy media before disposal
When old computers, drives, USB sticks, or paper documents leave your control, FCI shouldn't go with them. Wipe drives, shred paper, destroy CDs.
PE.L1-3.10.1
Limit physical access to systems
Physical access to your equipment and the spaces where you work with FCI should be limited to authorized people. Locked doors, badges, or — for home offices — household-only access.
PE.L1-3.10.3
Escort visitors and monitor activity
When non-employees come into your workspace, they shouldn't wander unsupervised — especially not into areas where FCI is visible or accessible.
PE.L1-3.10.4
Maintain audit logs of physical access
Keep records of who accessed your workspace and when. For most small contractors, this is a visitor log plus a list of who has badges/keys.
PE.L1-3.10.5
Control physical access devices
Track keys, badges, and other items that control access to your workspace. Recover them when people no longer need access.
SC.L1-3.13.1
Monitor and control communications at boundaries
Have basic firewall protection at the edge of your network. The router/firewall that came with your business internet plan satisfies this if it's configured.
SC.L1-3.13.5
Implement subnetworks for publicly accessible components
If you host any public-facing systems on your own network, they should be on a separate subnet from your internal systems. If you don't host any public systems, this is satisfied automatically.
SI.L1-3.14.1
Identify and remediate system flaws
Keep your systems patched. When updates come out for your operating system, applications, or firmware, install them — automatically when possible.
SI.L1-3.14.2
Protect against malicious code
Have anti-malware running on your computers. Built-in protection like Windows Defender or macOS XProtect is acceptable at Level 1 — you don't need a paid product.
SI.L1-3.14.4
Update malicious code protection
Anti-malware definitions need to stay current. Most modern tools update themselves automatically — confirm yours does.
SI.L1-3.14.5
Periodic and real-time scans
Your anti-malware should both run real-time scanning (catching threats as they arrive) and periodic full system scans (catching anything that slipped past).

How Level 1 differs from Level 2.

The two regulatory frameworks are related but operate on different scales. Understanding the difference helps you avoid being pulled into Level 2 obligations you don't actually have.

FAR 52.204-21

For: Federal contractors handling FCI

17 basic safeguarding practices. Self-assessed annually. Senior-official affirmation submitted in SPRS. The contractual foundation of CMMC Level 1.

NIST SP 800-171

For: DoD contractors handling CUI

110 detailed security requirements across 14 control families. Underlies CMMC Level 2. Requires a System Security Plan, POA&M for gaps, and (in most cases) third-party assessment by a C3PAO.

DFARS 252.204-7012

For: DoD contracts involving CUI

The DoD-specific clause that requires NIST 800-171 implementation. Includes additional requirements for cyber-incident reporting. Applies on top of the FAR clause when CUI is in scope.

If your DoD contract includes only FAR 52.204-21 (no DFARS 7012 clause and no CUI flow-down), you're a Level 1 shop. If your contract adds DFARS 7012 or specifies CUI handling, Level 2 applies.

How FAR 52.204-21 actually shows up in your work.

For a small contractor, FAR 52.204-21 isn't a document you read once and file away. The 17 practices show up in three concrete artifacts you produce each year.

Your annual self-assessment is your honest evaluation of whether each of the 17 practices is implemented in your environment. Unlike Level 2, there's no formal assessment methodology document — but there's a clear binary outcome for each practice: it's either in place, or it isn't. Practices that aren't in place must be remediated before you can affirm.

Your senior-official affirmation is a signed statement from a person authorized to bind the company — typically the owner, president, or CEO. The signature confirms that all 17 practices are in place as of the affirmation date. This is the legally operative document; it's a representation to the United States Government and carries False Claims Act exposure if signed inaccurately.

Your SPRS submission records the affirmation in DoD's Supplier Performance Risk System. Primes can verify your status by querying SPRS directly. The SPRS entry doesn't include the underlying assessment evidence — that stays in your records — but it does record that the affirmation was made and when.

Unlike Level 2, there's no Plan of Action and Milestones at Level 1. POA&Ms are explicitly forbidden — you can't document gaps and continue operating while you remediate. Every practice must be in place before the affirmation can be signed. This is the most important difference between the two levels in day-to-day operation.

Ready to find out where you actually stand?

Take the guided Level 1 interview. Walk away with a self-assessment report mapped to all 17 practices, plus the affirmation paperwork ready for your senior official to sign.