🚨 CMMC Phase One started November 10! Here's everything you need to know →

10 Practical Steps to Comply with FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Identify Information System Users, Processes Acting for Users, and Devices

Practical, actionable steps for small businesses to identify and track users, agent processes, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements.

•
April 01, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

If your organization handles federal contract information, FAR 52.204-21 and CMMC 2.0 Level 1 require you to reliably identify who (and what) is interacting with your information systems; IA.L1-B.1.V specifically expects you to identify system users, processes acting on behalf of users, and devices. This post gives ten practical, technical steps and real-world examples to help a small business implement this control as part of a Compliance Framework program.

Why identifying users, processes, and devices is essential

Identification is the foundation of accountability and access control: without unique user IDs, device identities, and mappings of processes-to-users, you cannot enforce least privilege, detect compromised credentials, or demonstrate compliance during an audit. For FAR/CMMC purposes you must show evidence that you can determine who performed an action, whether it was a human or an automated process, and from which device—this supports incident response, forensics, and proves you meet basic safeguarding obligations for federal contract information.

10 practical steps to implement IA.L1-B.1.V

Step-by-step actions

1) Assign unique user identifiers for everyone (no shared logins) and document the policy; 2) Inventory devices and issue device IDs (use device certificates, AD computer objects, or MDM IDs); 3) Register and label service accounts and automation identities separately from human users and enforce naming conventions; 4) Deploy centralized authentication (Azure AD, AD DS, Google Workspace SSO) with MFA for all interactive logins; 5) Implement endpoint agents (EDR/AM) that report device inventory and user sessions to a central console; 6) Log authentication and privilege use centrally (Windows Event IDs 4624/4648, Linux auth logs, cloud identity logs) and retain evidence required for audits; 7) Use NAC or network segmentation to only allow known device IDs onto contractor networks and put unknown devices on guest VLANs; 8) Automate provisioning/deprovisioning from HR (SCIM, AD automation) so identities are created and disabled with hiring/termination events; 9) Map processes acting for users — capture service-to-user associations in your CMDB and log service account activity separately with dedicated credentials and scoped permissions; 10) Regularly review and reconcile (quarterly) user lists, active devices, and service accounts, and record the review as compliance evidence.

Implementation notes specific to a Compliance Framework

Practical implementation must produce auditable evidence. For a Compliance Framework, tie technical controls to policy documents and procedures: link unique ID policy to your access control policy, attach device inventory exports to the Configuration Management procedure, and keep a monthly log of automated provisioning runs. Use concrete tech: enable AD/Azure AD audit logging (SignIns and AuditLogs), configure Linux syslog to forward auth.* to a central SIEM like Splunk/ELK or a cloud SIEM, and ensure retention (at least 90 days for Level 1 evidence unless your contract states otherwise). Use MDM (Microsoft Intune, Jamf, or a lightweight open-source MDM) to enforce device compliance and automatically report enrolled device IDs and OS versions into your asset inventory. For service/process mapping, require all automation to use managed identities or service principals rather than shared static credentials; store those in a vault (Azure Key Vault, HashiCorp Vault) and log vault access events.

Small-business scenarios and real-world examples

Example 1: A 12-person IT subcontractor uses Google Workspace and a mix of Windows laptops. They enabled Google SSO with MFA, deployed a small EDR agent to each laptop reporting the username and device ID to a central console, and used Google Admin reports as evidence of unique user IDs; they added a quarterly spreadsheet export of active users as audit evidence. Example 2: A two-person engineering shop uses Azure AD and Intune—new hires are onboarded through an HR-triggered Power Automate flow that creates the Azure AD account, enrolls the device in Intune, issues a device certificate, and registers it in a CMDB (spreadsheet or Jira). Service accounts for build pipelines are created as Azure Managed Identities and listed in the CMDB with scope and owner. These small-scale automations demonstrate compliance and reduce manual errors.

Compliance tips and best practices

Enforce least privilege and disable local admin for users; require separate accounts for admin tasks and log all privilege elevations. Prohibit shared or generic accounts; where unavoidable (e.g., a lab appliance), document compensating controls and monitor closely. Automate identity lifecycle with HR integration to avoid orphan accounts. Use unique device certificates or hardware identifiers (TPM-backed keys) where possible rather than relying solely on MAC addresses which can be spoofed. Maintain a simple CMDB and exportable evidence artifacts (CSV exports, SIEM alerts, screenshots of enrollment lists) to show auditors. Keep processes simple and repeatable—auditors appreciate consistency and reproducible evidence more than overly complex tooling.

Risks of failing to implement this control

If you cannot identify who or what performed actions on your systems you increase the risk of undetected insider misuse, credential compromise, and lateral movement by attackers. Non-compliance risks include losing federal contracts, failing CMMC verification (blocking future DoD engagements), potential contractual penalties, and reputational harm. Technically, lack of identity and device controls makes incident response much slower and forensics inconclusive—this multiplies breach cost and regulatory exposure.

In summary, meeting IA.L1-B.1.V under FAR 52.204-21 and CMMC 2.0 Level 1 is achievable for small businesses by applying ten straightforward practices: unique user IDs, device inventory and IDs, distinct service accounts, centralized authentication with MFA, endpoint telemetry, centralized logging, network controls, automated lifecycle management, process-to-user mapping, and regular reconciliation. Implement these within your Compliance Framework with clear policies, simple automation, and exportable evidence to reduce risk and demonstrate compliance during audits.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes