🚨 CMMC Phase One started November 10! Here's everything you need to know →

7-Step Checklist to Identify Information System Users, Processes Acting for Users, and Devices — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V

Practical 7-step checklist to identify and track users, processes acting for users, and devices to satisfy FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements.

April 13, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, actionable 7-step checklist to help small businesses meet the FAR 52.204-21 clause and CMMC 2.0 Level 1 control IA.L1-B.1.V requirement to identify information system users, the processes acting on their behalf, and devices — with hands-on implementation notes, examples, and compliance tips that map directly to Compliance Framework practices.

Why identification matters and the risk of non‑compliance

Identification is the foundation for access control, accountability, and incident response. FAR 52.204-21 requires contractors to implement basic safeguarding of Federal Contract Information (FCI); CMMC IA.L1-B.1.V expects you to know who and what is interacting with your systems. If you fail to identify users, processes, and devices you increase the risk of unauthorized access, undetected lateral movement, data exfiltration, contract penalties, and loss of future government work. For small businesses, the cost of a breach or audit failure — both monetary and reputational — can be existential.

7-step checklist (Compliance Framework — Practice Implementation)

Step 1 — Define scope and authoritative sources

Identify which systems, networks, and data stores contain FCI or fall under compliance scope (e.g., shared drives, email, cloud apps). Decide the authoritative registries: Active Directory/Azure AD for identities, MDM/Intune or Google Workspace for devices, and CMDB/asset inventory for endpoints. Implementation note: document scope in your Compliance Framework artifacts and keep a CSV export of authoritative sources (users.csv, devices.csv) to use as audit evidence.

Step 2 — Build an authoritative user registry

Ensure every user has a unique, auditable identity record (username, employee ID, role, owner, creation date). For small businesses: use Azure AD, G Suite, or an on‑prem AD. Technical details: enforce unique UPNs, fill AD attributes (title, department), and tag contractor/service accounts with a clear naming convention (svc-, bot-, api-). Evidence for audits: user registry export and onboarding/offboarding tickets.

Step 3 — Inventory and identify devices

Create a device inventory that includes device ID (UUID), hostname, MAC, OS, patch level, owner, last check‑in, and whether it is MDM enrolled. Use tools like Microsoft Intune, Jamf, or an RMM for managed devices; for unmanaged devices, use NAC (802.1X) or VPN posture checks. Small business scenario: use Intune + Azure AD Join for corporate laptops and register printers/routers with serial numbers and owner tags in the CMDB.

Step 4 — Identify processes and service identities acting for users

Catalog service accounts, scheduled jobs, APIs, automation tokens, and delegated processes that operate on behalf of users. Technical guidance: log and tag process identities (systemd unit names, service account names, OAuth client IDs, API keys) and attach them to the user or system owner in your registry. Example: a backup job running as svc-backup should map to a service owner and documented purpose in the compliance artifacts.

Step 5 — Implement control points that assert identity before access

Deploy controls that require identification: central authentication (AD/Azure AD/SSO), device checks (MDM enrollment, device compliance policies), and service authentication (mutual TLS, signed tokens). For small shops: enable SSO with MFA, require device compliance in Conditional Access policies, and use certificate-based authentication for machine identities. Technical details: configure syslog or Cloud Audit logs to include identity and device metadata for each authentication event.

Step 6 — Instrument logging and correlation

Log authentication events, process launches for privileged actions, device check‑ins, and API usage. Send logs to a central collector (SIEM, Splunk, Elastic) and create simple correlation rules that link user ID → process ID → device ID. Example: an SSH login record should show the user, the source device IP/MAC, and the process (sshd) — retain logs per Compliance Framework retention guidance and export samples for audit evidence.

Step 7 — Maintain, review, and evidence

Institute lifecycle procedures: onboarding/offboarding, quarterly reconciliation of users and devices, access reviews, and scheduled audits of service accounts and tokens. Practical tips: automate daily deprovisioning checks, run monthly reports to find inactive accounts or unmanaged devices, and store evidence artifacts (inventory snapshots, review meeting minutes, remediation tickets) in your compliance repository. Small business example: use a simple Google Sheet + exported logs and a quarterly SOC‑2 style checklist to demonstrate continuous review.

Compliance tips and best practices

Use automation where possible: scheduled exports of AD and MDM inventories, automated alerts for orphaned service accounts, and NAC for network enforcement. Standardize naming conventions for users and service accounts, assign clear owners, and require approval workflows for privileged account creation. Keep evidence tidy: snapshots of inventories, Conditional Access policies, screenshots of MFA configuration, and sample logs with correlated user→process→device events. Train helpdesk staff to create and close onboarding/offboarding tickets consistently — these tickets are key audit artifacts.

Conclusion

Meeting FAR 52.204-21 and CMMC IA.L1-B.1.V is practical for a small business if you follow a repeatable 7‑step approach: scope, authoritative registries, device inventory, process/service identity mapping, enforcement controls, logging/correlation, and continual review. Focus on authoritative sources, automation, clear ownership, and simple evidence collection to reduce risk and demonstrate compliance during audits — the effort you put into identification pays off in stronger security and saved time when auditors or incidents arrive.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes