Jackie Ramsey January 31, 2026 0

If you’re a small defense contractor, MFA CMMC compliance is one of those topics that sounds simple until it costs you a contract. CMMC 2.0 is now live, with rollout into contracts starting Nov 10, 2025, and it’s scheduled to become mandatory for new awards by Oct 31, 2026. That timeline makes identity controls a “do it now” issue, not a future project.

In plain business terms, MFA (multi-factor authentication) means a password plus something else, like an app approval or a security key. It’s the extra proof that the person signing in is really your employee.

I set expectations upfront with my clients: MFA helps a lot, but turning it on doesn’t automatically mean you’ve met CMMC requirements. If MFA is missing on the wrong access path, or it’s configured loosely, assessors will see it fast.

MFA in plain business terms, what it protects and what it doesn’t

Minimalist editorial sketch-style line art illustration with soft pencil texture in neutral tones and bold blue accent on a secure lock and shield representing MFA protection. Features a computer login screen and phone for authentication on a clean white background with faint network lines and RVA Tech Visions watermark.
An MFA login moment that blocks password-only break-ins, created with AI.

MFA is the deadbolt on the door, not the whole alarm system. Most account takeovers start with stolen passwords (phishing, reuse, leaks). MFA cuts off the “password-only” path by requiring a second proof.

Here’s what that looks like in real day-to-day IT:

Microsoft 365 sign-ins: A user enters their password to check email, then approves a prompt in Microsoft Authenticator. If an attacker only has the password, they get stopped.

VPN logins: A user connects from home, enters credentials, then completes MFA. Without MFA at the VPN entry point, an attacker can walk straight into your internal network.

Admin actions: An admin signs in to Entra ID or Microsoft 365, then must satisfy MFA again before changing Conditional Access or adding a new global admin.

What MFA does not fix:

  • Weak access rules (everyone has access to everything).
  • Unmanaged devices accessing CUI through a browser.
  • Stolen session tokens (attackers bypass the login step entirely).
  • Risky admin habits, like using one all-powerful account for daily email and admin work.

Assessors aren’t looking for “we enabled MFA.” They look for consistent enforcement and documentation. The DoD CMMC Level 2 Assessment Guide is a good reality check on how evidence is evaluated.

MFA types I trust for small businesses (and what I avoid)

For most SMBs, I keep it practical and strong:

Authenticator app with number matching: Solid default for users, especially in Microsoft 365.

FIDO2 security keys: My top pick for admins and high-risk users because they’re phishing-resistant.

Phishing-resistant MFA: If CUI is on the line, I treat phishing resistance as the safer standard, not a luxury.

What I avoid for high-risk accounts: SMS. It’s better than nothing, but it’s easier to intercept or socially engineer. I also flag “shared mailbox used like a person” and long “remember MFA for 30 days” settings without tight controls.

Where businesses get confused: MFA versus strong passwords, SSO, and device trust

A strong password is still just one factor. It doesn’t replace MFA for key access paths. Single sign-on (SSO) also doesn’t count as MFA by itself, it’s just a smoother login flow.

Conditional Access and device compliance can make MFA stronger (and reduce prompts), but they don’t replace MFA where MFA is required. Think of device trust as “only let approved laptops in,” and MFA as “prove you’re the right person.” In CUI environments, you usually need both.

How MFA supports CMMC 2.0 and NIST SP 800-171 by access type (and where it’s truly required)

Minimalist editorial illustration in sketch-style line art with soft pencil texture and bold green accents on checkmarks and paths, depicting a flowchart of access types like VPN, cloud, and admin with MFA gates on a clean white background.
Common access paths that should hit an MFA “gate” before reaching CUI, created with AI.

Most small defense contractors are targeting CMMC 2.0 Level 2, which aligns to NIST SP 800-171. In plain terms, the Access Control and Identification and Authentication families care about: unique IDs, strong authentication, and controlled remote access.

In practice, I treat MFA as effectively expected for these access types in a CUI environment:

  • Remote access into the network (VPN, remote desktop paths, remote tools).
  • Privileged access (admin portals, admin consoles, infrastructure management).
  • Cloud access to CUI in Microsoft 365 (SharePoint, OneDrive, Teams, Exchange).

There are edge cases where MFA isn’t technically possible (some service accounts, legacy gear). That’s where compensating controls matter, and they must be documented.

Microsoft’s own guidance can help you map identity controls to Level 2 expectations, including MFA and identity configuration. I often point clients to the Microsoft Entra CMMC Level 2 identification and authentication guidance as a starting reference.

Interactive user access (workstations, on-site logins, and everyday apps)

For normal users, I enforce MFA for cloud sign-ins to email and files, then tighten sessions. That usually means Conditional Access requiring MFA and limiting access from unmanaged devices.

Local Windows MFA at the workstation login is less common in SMBs, and it can get messy fast. A safer pattern is Windows Hello for Business (strong sign-in bound to the device) plus solid device policy, disk encryption, and tight CUI access groups.

Privileged and admin access (the easiest audit fail)

This is where I see the fastest failures.

My rule: every admin account gets phishing-resistant MFA, uses a separate admin identity (not the same account used for daily email), and has shorter session timeouts. Admin portals include Microsoft 365, Entra ID, firewalls, backup consoles, and server management.

If the client can support it, just-in-time admin workflows (time-bound elevation or approvals) reduce risk and clean up audit stories.

Remote access (VPN, RDP, remote support tools)

Assessors care that MFA is enforced at the entry point. If someone can establish a VPN tunnel with only a password, you’ve already lost the main security goal.

I like these patterns:

  • VPN with MFA enforced for all users who can reach in-scope resources.
  • RDP behind a gateway that requires MFA before session access.
  • Remote support tools with MFA enforced, no shared logins.

A common mistake is relying on “trusted location” or static IP allowlists alone. Those can help, but they aren’t strong authentication.

Cloud and SaaS access (Microsoft 365, SharePoint, OneDrive, Teams)

If CUI touches Microsoft 365, cloud MFA is not optional. I require MFA for both users and admins, block legacy authentication, and avoid “pilot-only” rollouts that never finish.

Conditional Access should be explicit: require MFA, require compliant devices for CUI apps, and restrict risky sign-ins where licensing supports it.

APIs, service accounts, and automation (where MFA can’t be used)

Service accounts can’t approve an authenticator prompt, so I don’t try to force MFA where it won’t work. Instead, I use safer patterns like managed identities, app registrations with certificates, short-lived credentials, least privilege permissions, IP restrictions, and monitoring.

For CMMC, the key is being able to explain it, prove it, and show ongoing control in your evidence pack.

Where MFA programs break, common misconfigurations, audit findings, and a practical fix plan

Minimalist editorial illustration in sketch-style line art with soft pencil texture and bold orange accents on a clean white background, depicting a horizontal roadmap timeline with phases: policy, rollout, hardening, evidence, including icons for MFA setup, training, and tests. Features RVA Tech Visions watermark in lower left.
A simple rollout roadmap that matches how small teams actually deploy MFA, created with AI.

Here’s what I fix first when a company says, “We already have MFA.”

Common MFA failures I see in CMMC prep (and why assessors flag them)

  • MFA enabled only for admins, not for all cloud users handling CUI.
  • Broad exclusions for “trusted IPs” that cover whole offices or VPN ranges.
  • Legacy authentication still allowed in Microsoft 365.
  • “Remember MFA” windows set too long, with no session controls.
  • Shared accounts (or shared mailboxes) being used like named users.
  • Break-glass accounts left weak, undocumented, or never reviewed.
  • Unmanaged personal devices accessing SharePoint or email with CUI.
  • VPN or remote access tools missing MFA at the point of entry.
  • No proof saved (policies, screenshots, exports, sign-in logs).

If you want a broader look at common audit pain points across CMMC, Scrut’s CMMC audit overview is a helpful read.

Implementation roadmap plus pre-assessment checklist for MFA CMMC compliance

Week 1: Define scope and policy, confirm who accesses CUI, map every access path.
Week 2: Roll out MFA to all in-scope users, train staff, handle enrollment.
Week 3: Harden policies, remove legacy auth, tighten exclusions, lock remote access.
Week 4: Build the evidence pack, test recovery steps, validate enforcement.

Pre-assessment checklist you can copy:

  • Inventory access paths (M365, VPN, RDP, admin consoles, remote tools)
  • Confirm MFA coverage for users and admins
  • Verify separate admin accounts and tighter sessions
  • Block legacy authentication
  • Review Conditional Access exclusions and “remember MFA” settings
  • Test remote access MFA at the entry point
  • Document compensating controls for service accounts and legacy systems
  • Capture evidence (policy text, Conditional Access exports, VPN config, sample sign-in logs)
  • Run a tabletop test for lost phone or lost security key

Conclusion

MFA is a foundation for MFA CMMC compliance, but it only works when it covers the right access types and you can prove it. For most small defense contractors using Microsoft 365, I focus on cloud sign-ins, remote access entry points, and privileged admin actions, then I document the exceptions with compensating controls.

The clock matters. CMMC 2.0 rollout started Nov 10, 2025, and it’s scheduled to be mandatory for new awards by Oct 31, 2026. Waiting until a proposal is due is how teams end up rushing, breaking workflows, and missing evidence.

If you want a clear path, I offer an MFA gap review at RVA Tech Visions across Microsoft 365, VPN, and admin access, with an evidence checklist you can reuse for your assessment.

FAQ for small and mid-size defense contractors

Do I need MFA for every user?
For anyone accessing CUI systems or the tools that protect them, yes.

Is SMS OK?
I avoid it for admins and high-risk users, use app or FIDO2 instead.

What about service accounts?
Use certificates, managed identities, least privilege, and monitoring, then document it.

Does SSO count as MFA?
No, SSO can include MFA, but SSO alone isn’t MFA.

What evidence should I save?
Policies, Conditional Access exports, VPN settings, and sample sign-in logs showing enforcement.


Discover more from Guide to Technology

Subscribe to get the latest posts sent to your email.

Category: 

Leave a Reply