Linkedin
  • Home
  • Demo & Video
  • Blog
  • About Us
  • Try Free Self-Assessment Tool
Menu Categories
  • Home
  • Demo & Video
  • Blog
  • About Us
  • Try Free Self-Assessment Tool
Linkedin
Cart To use Cart please install WooCommerce plugin
📚 Part 2 of 6 — CMMC Level 1: Simpler Than You Think

The 15 CMMC Level 1 Practices Explained Like You're a Human, Not a Lawyer

No jargon. No acronyms. Just plain English for small business owners.

Let's be honest. The first time you read the official CMMC Level 1 requirements, you probably felt one of two things: confusion or panic. Maybe both.

Government language has a special talent for making perfectly reasonable ideas sound like they were written by a committee of lawyers who get paid by the syllable. When you see phrases like "Verify and control/limit connections to and use of external information systems", your brain doesn't think "Oh, that's easy." It thinks "I need to hire someone."

But here's the thing: the 15 CMMC Level 1 practices are not complicated ideas. They're common-sense security measures dressed up in formal language. And once you strip away the jargon, you'll probably realize you're already doing most of them.

This post is your decoder ring. We're going to take each of the 15 practices straight from FAR 52.204-21 (the federal regulation that defines these requirements), translate them into plain English, and give you a real-world example of what each one looks like in a small business.

🔑 Before We Start: Three Things to Know

1. These are Level 1 requirements. That means self-assessment only. No outside auditor walking through your office. You assess yourself and affirm your compliance.

2. "Simple" doesn't mean "skip it." You still need to document that you're doing these things. The practices themselves are reasonable—the real work is proving you follow them. That's where most contractors need help.

3. Self-assessment doesn't mean you won't be audited. The DoD can verify your compliance at any time. Without organized evidence to prove you're actually doing what you claimed, you could face costly consequences—including False Claims Act penalties, contract loss, and debarment.

🔐

Access Control

Practices 1–4 — Who gets in, and what can they do?
Practice 1
🏛️ The Government Says:

"Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems)."

🗣️ In Plain English:

Only people who are supposed to use your systems should be able to use them. Everyone gets their own login. No shared passwords.

💡 Real-World Example:

Each employee has their own username and password for your company email and file storage. When someone leaves the company, you disable their account that same day. You don't have a sticky note on the break room wall with the "company password."

Practice 2
🏛️ The Government Says:

"Limit information system access to the types of transactions and functions that authorized users are permitted to execute."

🗣️ In Plain English:

People should only have access to the stuff they need for their job. The intern doesn't need admin access. Your bookkeeper doesn't need access to engineering files.

💡 Real-World Example:

In Google Workspace or Microsoft 365, you set up shared drives so the accounting team can access financial folders but not the project files for a specific contract. Your office manager can manage calendars but can't delete other people's email.

Practice 3
🏛️ The Government Says:

"Verify and control/limit connections to and use of external information systems."

🗣️ In Plain English:

Be careful about what outside services, apps, and devices connect to your business systems. Don't let random apps or personal devices access your company data without approval.

💡 Real-World Example:

You don't let employees install random third-party apps that connect to your company Google Drive or OneDrive. If someone wants to use a new project management tool that syncs with company files, it goes through an approval process first—even if that "process" is just asking the boss.

Practice 4
🏛️ The Government Says:

"Control information posted or processed on publicly accessible information systems."

🗣️ In Plain English:

Be careful about what you put on your website, social media, or any public-facing platform. Don't accidentally post sensitive contract information where anyone can find it.

💡 Real-World Example:

Before posting a project update on your company LinkedIn page, someone reviews it to make sure it doesn't include details about a government contract, internal processes, or anything that should stay private. You have a basic rule: when in doubt, don't post it publicly.

✅ See? Four practices down. "Control who has access and be careful what goes public." You're probably already doing most of this.

🪪

Identification & Authentication

Practices 5–6 — Prove you are who you say you are
Practice 5
🏛️ The Government Says:

"Identify information system users, processes acting on behalf of users, or devices."

🗣️ In Plain English:

You need to know who and what is on your network. Every person gets a unique account. Every device is identifiable. No anonymous access.

💡 Real-World Example:

Every employee logs in with their own email address—like jane.smith@yourcompany.com—not a generic "front.desk@" or "info@" account for daily work. If you looked at a file's edit history, you could tell exactly who touched it and when.

Practice 6
🏛️ The Government Says:

"Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems."

🗣️ In Plain English:

Before anyone gets access, they have to prove they're actually them. Passwords, multi-factor authentication (that code texted to your phone)—something that verifies identity.

💡 Real-World Example:

Every employee signs in with a password that meets your company's complexity requirements. Ideally, you also have multi-factor authentication turned on—so after entering a password, they confirm with a code on their phone. This is a setting you can enable in Google Workspace or Microsoft 365 in about five minutes.

✅ Translation: "Everyone has their own account, and they have to prove it's them before logging in." That's it. Six down, nine to go.

💾

Media Protection

Practice 7 — Don't leave data lying around
Practice 7
🏛️ The Government Says:

"Sanitize or destroy information system media containing Federal Contract Information before disposal or release for reuse."

🗣️ In Plain English:

When you throw away or repurpose a computer, hard drive, USB drive, or phone, wipe the data first. Don't donate your old laptop with contract files still on it.

💡 Real-World Example:

Before recycling an old company laptop, you factory-reset it or use a disk-wiping tool to erase everything. If it's a USB drive you no longer need, you either wipe it or physically destroy it. You keep a simple log: "Wiped laptop serial #XYZ on [date]."

✅ One practice, one idea: "Wipe your stuff before you get rid of it." You wouldn't sell your old phone without clearing it first—same principle.

🏢

Physical Protection

Practices 8–13 — Lock the doors and know who's inside
Practice 8
🏛️ The Government Says:

"Limit physical access to organizational information systems, equipment, and the respective operating environments to authorized individuals."

🗣️ In Plain English:

Don't let random people walk up to your computers and servers. Lock your office. Control who gets in the building.

💡 Real-World Example:

Your office has a locked front door. Employees have keys or access cards. The server closet (or the room with important equipment) isn't left open for anyone to wander into. If you work from a home office, you have a dedicated workspace that guests and family members don't use.

Practice 9
🏛️ The Government Says:

"Escort visitors and monitor visitor activity; maintain audit logs of physical access."

🗣️ In Plain English:

When non-employees visit your office, someone accompanies them. Don't leave the repair technician alone in a room full of computers with contract data.

💡 Real-World Example:

When the IT technician comes to fix the printer, an employee stays in the area. Visitors sign in at the front and sign out when they leave. It doesn't have to be fancy—a clipboard with names, dates, and times works fine.

Practice 10
🏛️ The Government Says:

"Maintain audit logs of physical access."

🗣️ In Plain English:

Keep a record of who enters areas where your systems and data are located.

💡 Real-World Example:

That visitor sign-in sheet we just mentioned? That's an audit log. If you have an electronic key card system, it automatically tracks entries. Even a simple spreadsheet listing who accessed the server room and when counts. The point is having a record you can look back at if needed.

Practice 11
🏛️ The Government Says:

"Control and manage physical access devices."

🗣️ In Plain English:

Keep track of your keys, access cards, and badges. Know who has them. Get them back when someone leaves.

💡 Real-World Example:

You maintain a list of who has which office keys or access badges. When an employee leaves, collecting their key or badge is part of the offboarding checklist—right alongside disabling their email. If a key goes missing, you change the locks or re-key rather than hoping for the best.

Practice 12
🏛️ The Government Says:

"Screen individuals prior to authorizing access to organizational systems containing Federal Contract Information."

🗣️ In Plain English:

Before giving someone access to systems with government contract data, do a basic check on them. You need to know who you're trusting with sensitive information.

💡 Real-World Example:

You run a background check before hiring employees who'll handle contract data. This doesn't have to be a federal investigation—a standard employment background check satisfies this requirement. The key is having a documented process: "Before granting access, we verify [these things]."

Practice 13
🏛️ The Government Says:

"Protect and monitor the physical facility and support infrastructure for organizational systems."

🗣️ In Plain English:

Take reasonable steps to physically protect your workspace—things like fire safety, environmental controls, and making sure your equipment isn't vulnerable to theft or damage.

💡 Real-World Example:

Your office has working fire alarms and extinguishers. The server or network equipment isn't sitting on the floor in a flood-prone basement. You lock up at night. If you have security cameras, even better—but basic physical security measures are what this is about.

✅ The physical protection category boils down to: "Lock your doors, watch your visitors, track your keys, and take care of your space." Thirteen practices done. You're on a roll.

Feeling Better About CMMC Already?

These 15 practices are manageable—but each one needs proper documentation. Our toolkit breaks them down into 142 specific artifacts so you know exactly what to document and how.

Try the Free Self-Assessment Talk to an Expert
🛡️

System & Information Integrity

Practices 14–15 — Keep your systems healthy and protected
Practice 14
🏛️ The Government Says:

"Identify, report, and correct information and information system flaws in a timely manner."

🗣️ In Plain English:

Keep your software updated. When there's a security patch or update available, install it. Don't ignore those "update available" notifications for six months.

💡 Real-World Example:

You have automatic updates turned on for Windows, macOS, or Chrome OS. When Google Workspace or Microsoft 365 rolls out security updates, they happen automatically. For other business software, you check for updates regularly—at least monthly. When something breaks or looks suspicious, you have a way to report and address it.

Practice 15
🏛️ The Government Says:

"Provide protection from malicious code at appropriate locations within organizational information systems."

🗣️ In Plain English:

Use antivirus and anti-malware protection. Keep it updated. Make sure it's actually running on your computers.

💡 Real-World Example:

Every company computer runs antivirus software—Windows Defender (built into Windows), or a business antivirus solution like SentinelOne or Bitdefender. It's set to update automatically and run regular scans. You haven't disabled it because "it slows things down."

✅ That's all 15. "Update your software and run antivirus." You probably thought CMMC would be harder than this.

The Complete Cheat Sheet

Here are all 15 practices, translated, in one place:

1. Only authorized people get system access
2. People only access what they need for their job
3. Control what outside apps and devices connect to your systems
4. Review anything before posting it publicly
5. Everyone has a unique, identifiable account
6. Verify identity before granting access (passwords + MFA)
7. Wipe data from devices before disposal or reuse
8. Lock your doors and limit physical access to equipment
9. Escort and monitor visitors
10. Keep a log of who enters secure areas
11. Track keys, badges, and access cards
12. Check people out before giving them access
13. Protect your workspace from physical threats
14. Keep your software updated
15. Run antivirus protection

Read that list again. Does any of that sound unreasonable? Does any of it sound like something a responsible business shouldn't already be doing?

That's the real secret of CMMC Level 1: these aren't exotic cybersecurity requirements. They're basic business hygiene wrapped in government language.

So If It's This Simple, What's the Hard Part?

Here's where we have to be straight with you. Understanding the 15 practices is step one. But CMMC compliance isn't about doing these things—it's about proving you do them.

Each of these 15 practices breaks down into multiple specific requirements. In total, there are 142 individual artifacts you need to document across all 15 practices. That includes things like:

Written policies for each area (access control, physical security, etc.)
Configuration evidence (screenshots showing settings are correct)
Procedures and workflows (how your team actually does things)
Logs and records (proof that practices are followed consistently)
Review documentation (evidence that someone checks on all of this regularly)

That's the part that trips people up. Not the security practices themselves—the documentation of those practices. And it's the part where most small contractors either get stuck, make expensive mistakes, or give up and hire a $30,000+ consultant.

⚠️ The Documentation Trap

The most common CMMC Level 1 failure isn't poor security. It's poor documentation. Contractors who are doing all the right things still fail because they can't prove it with organized, complete evidence. The DoD can verify your self-assessment at any time—and "we do that, trust us" isn't evidence.

From 15 Practices to 142 Artifacts (Without the Headache)

This is exactly why we built the Overwatch Tools CMMC Toolkit. We took each of these 15 practices and broke them down into every specific artifact you need—142 in total—so there's zero guesswork about what to document or how.

What You Get

Every artifact defined: No wondering "is this enough?" — each of the 142 requirements is clearly spelled out
Pre-built templates: 400+ customizable templates so you're never starting from a blank page
Platform-specific guides: Step-by-step configuration instructions for Google Workspace or Microsoft 365
Evidence Locker: Centralized storage that keeps all your compliance documentation organized and assessment-ready
SPRS Report: Automated scoring and professional report generation

With our Turnkey Package ($2,495/year), you also get 8 bi-weekly expert consulting sessions to walk you through the process. Most clients complete their Level 1 assessment in 2–4 weeks because they're never stuck wondering what comes next.

Prefer to do it yourself? The DIY Toolkit ($1,495/year) gives you all the tools, templates, and artifact definitions with email support.

15 Practices. All Reasonable. All Doable.

Now you know what CMMC Level 1 actually asks for. The next step is turning that knowledge into documented, assessment-ready compliance.

Start with a free self-assessment to see where you stand—or schedule a call to talk through your specific situation.

Start Your Free Self-Assessment Schedule a Free Consultation

📚 This Is Part 2 of Our CMMC Level 1 Series

Part 1: You're Already 70% Compliant. You Just Don't Know It Yet.

Up Next (Part 3): Your Laptop Is Fine. Here's What Actually Matters for CMMC.

Follow the full series to go from overwhelmed to assessment-ready.

Overwatch Tools

CMMC Compliance Solutions for Small Defense Contractors

info@overwatchtools.com | overwatchtools.com

Chesapeake, Virginia | © 2025 Overwatch Tools, Inc.

Share Post
  • Twitter
  • Facebook
  • VK
  • Pinterest
  • Mail to friend
  • Linkedin
  • Whatsapp
  • Skype

Comments are closed

Company Address

  • Overwatch Tools, Inc.
  • 300 Woodards Ford Road
  • Chesapeake Virginia 23322
  • E-Mail: info@overwatchtools.com
  • Outervision Capitol Company
  • Privacy Policy

,Copyright © 2025 Overwatch Tools, Inc.

Home
Shop
Contact us
More
More
  • Home
  • Demo & Video
  • Blog
  • About Us
  • Try Free Self-Assessment Tool