🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Implement User, Process, and Device Identity Verification for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI: Practical Checklist

Practical, step-by-step checklist to verify user, process, and device identities to meet FAR 52.204-21 and CMMC 2.0 Level 1 requirements for small businesses.

•
April 08, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, audit-ready checklist and implementation guidance for verifying user, process, and device identities to support compliance with FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.VI), with real-world steps a small business can apply immediately.

Implementation checklist — what to do first

Start by documenting scope and baseline: list all systems that handle Federal Contract Information (FCI), the user groups that access them, and the endpoints (laptops, servers, IoT devices) that connect. Create a short policy that states your identity verification objectives (who/what is allowed, required verification methods, evidence retention). At a minimum implement (1) unique user identities, (2) MFA for interactive access, (3) managed device enrollment, and (4) authenticated service/process identities with rotation and logging. Track artifacts for evidence: enrollment rosters, MFA logs, MDM device lists, service account inventory, and screenshots of configuration pages.

User identity verification — practical steps

For users, enforce unique accounts and multi-factor authentication (MFA). Use a cloud identity provider (Azure AD, Google Workspace, Okta) or an on-premises SSO that supports SAML/OIDC. Configure conditional access to block legacy auth where possible and require MFA for remote access to company resources. For small shops: enable built-in MFA (e.g., Microsoft Authenticator or YubiKey) and require it for all accounts with access to contract data. Document enrollment dates, the method used, and authentication logs; capture screenshots of the tenant MFA policy and export sign-in logs for one month as evidence. Enforce strong password policies, but prioritize MFA as the primary verifier for interactive logins.

Process (service) identity verification — practical steps

Processes and services (CI/CD pipelines, automated backups, API integrations) must authenticate using non-interactive credentials that are auditable and rotated. Replace long-lived plaintext secrets with managed credentials: use a secrets manager (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault) and configure short-lived certificates or tokens. Use machine identities—X.509 certificates or OAuth 2.0 client credentials—for service-to-service auth. For example, configure your build server to obtain a temporary token from Vault with a one-hour TTL rather than storing a GitHub PAT in plaintext. Maintain an inventory of service accounts, their owners, and rotation schedules; collect logs of vault issuance for audit evidence.

Device identity verification — practical steps

Bring your endpoints under management: deploy an MDM solution (Intune, Jamf, Fleetsmith) and require device enrollment before access to sensitive resources. Enforce device posture checks: disk encryption (BitLocker/FileVault), up-to-date OS and AV signatures, and screen lock policies. Implement certificate-based access for critical systems—issue device certificates from an internal CA and require them for VPN or Wi‑Fi connections. For SSH access to servers, disable password auth and require SSH keys stored in a bastion or managed via a key manager. Maintain an MDM roster with serial numbers, owner names, last check-in, and compliance status as audit evidence.

Technical notes and small-business examples: a 12-person subcontractor can use Azure AD Business with Conditional Access for MFA, Intune for device enrollment, and GitHub Actions + HashiCorp Vault for process secrets. Practical commands include generating modern SSH keys (ssh-keygen -t ed25519) and creating short-lived service tokens via Vault (vault token create -ttl=1h -policy="ci-access"). Keep retention of authentication logs to at least 90 days for investigation and evidence—export sign-in logs weekly and store them in an S3 bucket or secure file share with access controls.

Compliance tips and best practices: adopt least privilege for all identities; enforce role-based access control (RBAC) and group membership reviews quarterly; enable centralized logging and alerting for failed authentications; maintain a simple runbook for onboarding/offboarding with steps to revoke access and wipe devices; and keep screenshots and timestamps of configuration changes. For evidence in a FAR/CMMC assessment, prepare: the policy document, MFA enrollment logs, device enrollment export, service account inventory, examples of rotated secrets, and SIEM search results for authentication events.

Risk of not implementing: without reliable identity verification, an attacker can access FCI through credential compromise, unmanaged devices, or abused service accounts—leading to data exposure, contract penalties, loss of future contracts, and reputational damage. Unverified devices introduce malware risk and lateral movement; unverified processes allow automation to exfiltrate data or change configurations unnoticed. Auditors will flag missing MFA, unmanaged endpoints, or unlogged service access as findings that must be remediated before certification.

Summary: implement identity verification across users, processes, and devices by combining unique identities, MFA, managed device enrollment, and credential lifecycle controls; document policies and collect clear evidence (logs, rosters, screenshots). For small businesses, prioritize cloud identity providers plus an MDM and a secrets manager to gain rapid controls coverage and produce the artifacts auditors expect for FAR 52.204-21 and CMMC 2.0 Level 1 assessments.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes