MFA is where assessors ask very specific questions about your actual setup. Most contractors have MFA for the cloud tenant. Good. But then the assessor digs: what about local admin accounts? What about service accounts? What about legacy on-premises systems? And you discover gaps. This practice builds on the device and user authentication work from IA.L2-3.5.2 and ties into access control enforcement covered in AC.L2-3.1.1.
What the assessor is actually evaluating
The assessor is checking two things. One: is MFA actually enabled and being enforced for the accounts that matter? Two: is it covering the places where privileged activity actually happens in your environment?
If you’re mostly cloud-based, they’re checking your identity provider configuration and conditional access policies. If you have on-premises systems, they’re checking how privileged access there is protected. If you have a hybrid environment (most small contractors do), they’re checking both and whether the gaps are known and documented.
When they ask about local accounts or service accounts, they’re not trying to catch you. They’re trying to understand your actual threat surface. If you say “we don’t allow local admin logons, only delegated network access through Kerberos,” that’s clear. If you say “yeah, local admins exist but we manage them with LAPS so it’s fine,” that creates doubt. You need to be able to answer how MFA is enforced or why the account doesn’t need it.
What a realistic SSP definition looks like
Practice IA.L2-3.5.3: Multifactor Authentication
Multifactor authentication is required for all privileged account access and all network access to systems containing CUI.
Cloud Access (Azure AD/Microsoft 365): All user accounts in Azure AD are subject to conditional access policies that enforce MFA. Policies require MFA for any login from a new device, from outside the corporate network, or for any account with administrative roles. Administrative accounts require MFA for every login without exception. MFA is enforced via the Microsoft Authenticator app and FIDO2 security keys for highest-risk roles.
On-Premises Access: Privileged accounts requiring on-premises administrative access authenticate through [domain controller / identity provider]. MFA is enforced via [RADIUS server / smart card / third-party MFA solution] for all administrative logons. Non-privileged users do not require MFA for standard network access.
Local Administrative Accounts: Local administrative accounts are not used for interactive logon. Administrative tasks on Windows systems are performed through [delegation method - just-in-time access / privileged access workstations / Kerberos delegation]. This eliminates the need for local account logons and ensures all administrative activity passes through authenticated, audited channels.
Service Accounts: Service accounts used for automated processes (backup, monitoring, scheduled tasks) do not require MFA due to their non-interactive nature. All service accounts are registered in our service account registry with documented purpose and systems accessed. Service account credentials are stored in [credential vault] and accessed through documented processes. Administrative review of service account access occurs quarterly per the Access Control policy.
Remote Access: VPN access requires MFA prior to network access. Users authenticate with username/password and a second factor (authenticator app or hardware token) before the VPN connection is established. The VPN system is configured to reject connections from accounts without MFA enrolled.
All MFA-protected accounts are tracked in our privileged account registry. This registry is reviewed quarterly to ensure MFA enforcement is current and accounts without MFA are documented with business justification.
This is precise because it addresses the gaps. It says clearly: local admin accounts don’t exist for interactive logon. Service accounts are documented with justification. On-premises accounts have a specific MFA mechanism. Cloud accounts have conditional access. The assessor reads this and doesn’t have to hunt for the answer to “what about local accounts?”
How to present your evidence
- MFA policy documentation covering when MFA is required
- Identity provider configuration showing MFA enforcement (conditional access, smart card, RADIUS, etc.)
- MFA enrollment status report showing protected accounts
- Authentication logs (30 days) showing MFA challenges are being triggered
Have these artifacts ready:
MFA Policy documentation. Your written policy covering when MFA is required and what constitutes acceptable MFA. A policy that just says “MFA is required” is fine, but one that spells out specific scenarios is better.
Identity provider configuration. For Azure AD/Entra, pull up conditional access policies. For on-premises, pull up whatever method you use (smart card requirements, RADIUS, etc.). Show the settings that enforce MFA.
MFA enrollment and status. A report showing which accounts are MFA-enrolled and which are not. This could come from your identity provider’s admin portal.
Logs showing MFA is being triggered. Pull authentication logs from the past 30 days showing MFA challenges. This proves active implementation in practice, beyond policy documentation.
Documentation of non-MFA exceptions. If you have service accounts or other accounts that don’t require MFA, document why. “Service account for daily backup at 2 AM, no MFA required due to non-interactive use. Reviewed [date].”
Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.
Common failures
Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.
If you use an MSP or MSSP
Your MSSP should be the experts on MFA in your environment. They manage identity, directory services, and access control. They should have their own MFA configuration locked down, and they should have built your MFA configuration into your environment during onboarding.
In the assessment room, your MSSP should be able to walk through the conditional access policies, show the configuration, pull the logs, and explain why each policy is there. The contractor can speak to business requirements. The MSSP speaks to technical implementation.
Watch for this: if your MSSP hasn’t documented how they handle MFA for their own privileged access into your environment, that’s a red flag. A good MSSP requires MFA for every access to a customer environment. They should be able to show this.
This guidance is based on assessment room experience and reflects one practitioner’s interpretation of CMMC Level 2 requirements. It is not legal or compliance advice. Always consult your compliance team and official CMMC documentation for final guidance.