🚨 CMMC Phase One started November 10! Here's everything you need to know →

Checklist: Technical Controls and Configurations to Authenticate Identities under FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI

Practical checklist of technical controls and configuration examples to authenticate identities and meet FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.VI requirements for small businesses.

•
April 17, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This checklist provides concrete, actionable technical controls and configuration guidance to authenticate identities in support of FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI), with real-world small-business scenarios, specific config examples, and evidence items auditors expect to see.

Why identity authentication matters for FAR 52.204-21 / CMMC 2.0 Level 1

FAR 52.204-21 places an obligation on contractors to apply basic safeguarding to covered defense information; CMMC 2.0 Level 1 requires basic cyber hygiene controls including authentication of users and devices. Authenticating identities reliably prevents unauthorized access to Controlled Unclassified Information (CUI) and covered defense information — a foundational step for confidentiality and incident prevention.

Technical controls checklist

Account and password configuration

Implement unique user accounts (no shared credentials) and enforce strong password policies. For domain-joined Windows environments use Group Policy or Intune policy settings such as Minimum password length = 12 characters, Password complexity enabled, Enforce password history = 24, and Account lockout threshold = 10 attempts with a 15–30 minute lockout duration. For cloud identities (Azure AD / Google Workspace / Okta) enable a strong password policy and ban common compromised passwords. Where possible, avoid forcing frequent password rotation unless compromise is suspected — instead require rotation after confirmed risk, aligning with modern guidance.

Multi-factor authentication (MFA)

Require MFA for all remote access and administrator accounts. Prefer phishing-resistant second factors (FIDO2/WebAuthn hardware tokens, PIV/CAC) for privileged users; accept authenticator apps (TOTP) for general staff. Practical examples: enable Conditional Access in Azure AD to require MFA for administrative roles and for sign-ins from untrusted networks; configure your VPN (e.g., OpenVPN, Cisco ASA, Palo Alto GlobalProtect) to use RADIUS or SAML for authentication with MFA enforced. Evidence for auditors: Conditional Access policy screenshots, VPN auth logs showing successful MFA validation.

Service and privileged account management

Eliminate shared interactive accounts; use role-based accounts with least privilege. Manage service credentials with a secrets manager (HashiCorp Vault, Azure Key Vault, CyberArk, or a managed password vault) and rotate secrets on a schedule or after events. For SSH access, adopt key-based auth and centralize key management — example sshd_config hardening lines: PasswordAuthentication no, PermitRootLogin no, PubkeyAuthentication yes. Use jump hosts/bastion hosts with MFA and audit logging for administrative sessions.

Certificate and device-based authentication

When possible, use certificate-based authentication or device compliance checks. Implement PKI for machine and user certificates (mutual TLS) or require smartcards/CAC for interactive logons on systems that handle covered information. If using Kerberos/AD, ensure accurate time sync (NTP) across domain controllers and endpoints to avoid authentication failures. For cloud-first small businesses, enforce device compliance (Intune/Endpoint Manager) in Conditional Access so only managed, up-to-date devices can access sensitive apps.

Logging, monitoring, and auditability

Log all authentication events and centralize them to a SIEM or log store (Azure Sentinel, Splunk, Elastic). Capture successful and failed sign-ins, MFA events, account lockouts, and privilege elevation. Configure alerts for suspicious patterns: repeated failed logons from one IP, impossible travel, or new admin role assignment. Retain logs per your policy (recommendation: at least 90 days for quick incident response; keep longer if required by contract). Exportable evidence: sign-in logs, alert emails, SIEM dashboards, and retention policy documents.

Risk of not implementing these controls

Failure to authenticate identities robustly exposes organizations to credential theft, unauthorized access to CUI, lateral movement, and supply-chain compromise. For a small contractor, a single compromised account can lead to data exfiltration, contract penalties, suspension from procurement, and costly incident response. Operationally, weak authentication increases the chance of ransom incidents and erodes trust with prime contractors and government customers.

Compliance tips and real-world small-business scenarios

Practical small-business example: a 25-person subcontractor using Microsoft 365 and one on-prem file server. Quick steps: onboard to Azure AD, enable MFA for all users, enable Conditional Access to require MFA from untrusted networks, enforce Windows GPO password policy for the on-prem server, disable shared accounts and move service credentials into Azure Key Vault, and forward auth logs to a managed SIEM or to Azure Sentinel with a low-cost connector. For evidence: collect screenshots of MFA enablement, Conditional Access policy JSON export, GPO settings screen, SIEM export of auth events, and a short system architecture diagram showing auth flow.

Best practices and evidence to prepare for assessment

Document each control, include configuration exports (GPO backups, Conditional Access policy JSON, sshd_config excerpts), retain logs and produce incident response runbooks. Conduct periodic tabletop tests for authentication failures and simulated phishing to verify MFA coverage. For procurement compliance, maintain a short control matrix mapping each technical control back to FAR 52.204-21 and the CMMC practice IA.L1-B.1.VI and store evidence artifacts in a folder or compliance platform for quick auditor review.

Summary: implement unique accounts, strong password policies, MFA everywhere practical, centralized credential management, certificate/device-based auth where feasible, and comprehensive logging; combine these concrete configurations and evidence artifacts to meet FAR 52.204-21 and CMMC 2.0 Level 1 expectations while reducing real-world risk for small businesses.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes