🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create a Compliance Checklist for Authenticating Users, Processes, and Devices — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI

Step-by-step guidance to build an auditable checklist that ensures users, processes, and devices are authenticated per FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.VI, including technical controls and small-business examples.

March 26, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, auditable checklist you can implement today to authenticate users, processes, and devices in alignment with FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI), focusing on concrete steps, technical controls, and small-business scenarios.

Understanding the requirement

FAR 52.204-21 requires contractors to implement basic safeguarding of contractor information systems, and CMMC 2.0 Level 1 IA.L1-B.1.VI requires organizations to authenticate, or verify, the identity of users, processes, and devices before allowing access to Controlled Unclassified Information (CUI) or systems that process it. In practice, that means establishing and documenting controls that ensure each access request is attributable and validated—whether it comes from a person, service, or endpoint—before a session is established.

Key objectives to capture in your checklist

At a minimum your checklist should show you: (1) unique identification for all user and non-human accounts, (2) multi-factor authentication (MFA) or equivalent for human access to sensitive systems, (3) verification of processes and services (e.g., API keys, mutual TLS, signed binaries), (4) device authentication and posture checks (e.g., certificates, MDM enrollment, 802.1X), (5) session protections (timeouts, re-authentication on privilege elevation), and (6) logging and monitoring of authentication events for audit and incident response.

Practical implementation checklist — Users

Checklist items for user authentication: assign unique IDs and disable shared logins; enforce MFA (TOTP, hardware token, or platform authenticators) for all users with access to CUI; integrate SSO via SAML/OIDC with an enterprise IdP (Azure AD, Okta, Google Workspace) to centralize authentication policies; implement strong password policies (length ≥ 12, passphrase encouragement) and automated password expiration only when required by risk; configure account lockout thresholds (e.g., 5 failed attempts → 15-minute lockout) and require re-authentication for sensitive operations. Technical detail: enable federated logging of IdP events to a log collector or CloudTrail/Sign-in logs for audit; enforce conditional access rules (location, device compliance) where supported.

Practical implementation checklist — Processes

For processes and services: use machine identities (X.509 certificates, mTLS) or short-lived tokens (OAuth 2.0 client credentials, AWS STS) instead of static keys where possible; require code signing for internally distributed binaries and verify signatures on startup; rotate API keys and service account credentials on a schedule (90 days or shorter) and store secrets in a secrets manager (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault); harden SSH access by using ED25519 or RSA ≥ 3072 keys, disable password authentication, and manage keys centrally. Document service account owners and access justification to support audits.

Practical implementation checklist — Devices

Device authentication should be explicit: enroll company devices in an MDM (Intune, Jamf) and require device certificates or 802.1X for network access; implement posture checks for antivirus, disk encryption (BitLocker/FileVault), and OS patch level before granting access—use conditional access policies to block non-compliant devices. For unmanaged or BYOD scenarios, provide limited access using VPNs with MFA and device isolation (VPN split-tunnel minimization, limited VLANs). Technical configuration example: deploy a private PKI and issue client certificates with short lifetimes (1 year or less) and CRL/OCSP checking enabled for TLS client authentication.

Implementation notes for Compliance Framework and small-business examples

For small businesses that must meet the Compliance Framework, prioritize simple, auditable controls that give the most compliance "bang for the buck." Example A: A small defense subcontractor can use Azure AD with MFA + Intune to cover user and device authentication quickly—enable Conditional Access to require device compliance for SharePoint/Teams access and collect sign-in logs for audit. Example B: A software shop with CI/CD pipelines should use signed artifacts and a secrets manager; configure the build server to use short-lived service tokens and log all pipeline executions. Example C: A small field service company can enforce VPN with MFA plus device certificates for company laptops and provide contractors access via ephemeral credentials with strict scope and expiration.

Compliance tips, best practices, and logging requirements

Keep an auditable trail: forward authentication events (successful/failed logins, token issuance, certificate use) to a centralized log store for at least the organization’s retention period (90 days minimum recommended for Level 1 evidence), map log sources to system owners, and include why a control is in place in your compliance documentation. Use least privilege and role-based access control (RBAC), automate onboarding/offboarding (deprovisioning within 24 hours of role change), and periodically review accounts and keys. For low-cost monitoring, enable native cloud logs and use built-in alerting (Azure Monitor/Azure Sentinel free tiers, Amazon CloudWatch + simple Lambda alert).

Risks of not implementing these controls

Failure to properly authenticate users, processes, and devices increases risk of account takeover, lateral movement, data exfiltration, and supply-chain compromise—risks that can lead to contract termination, financial penalties, and loss of future government work under FAR and CMMC programs. Practically, weak or missing authentication controls make it trivial for attackers to reuse stolen credentials, impersonate services, or introduce malicious code into automated pipelines, placing both CUI and business continuity at risk.

Summary: Build a focused, auditable checklist that maps each item (unique IDs, MFA, machine identity management, device enrollment, session controls, logging) to your systems and responsible owners, implement quick wins like SSO+MFA and an MDM, and document evidence per the Compliance Framework. Small businesses can meet FAR 52.204-21 and CMMC IA.L1-B.1.VI by combining cloud identity features with basic PKI/secrets management, centralized logging, and routine account/key hygiene to produce both security and audit-ready proof.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes