🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI

Practical guide for SMBs to implement FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI

•
January 06, 2026
•
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.VI – Authenticate (or verify) the identities of those users, processes, or devices, as a prerequisite to allowing access to organizational information systems.

Understanding the Requirement

This control requires that your organization confirm who — or what — is requesting access before granting it. At a minimum that means authenticating human users with credentials, ensuring any automated processes or service accounts are verified when they act on a user's behalf, and verifying devices before they connect to internal systems. For SMBs working toward FAR 52.204-21 / CMMC 2.0 Level 1 compliance, focus on practical, enforceable mechanisms (passwords, managed accounts, device enrollment) that prevent anonymous or unauthenticated access.

Technical Implementation

  • Enforce password protection and complexity: Use Active Directory Group Policy or your endpoint management tool to require unique usernames and passwords for all interactive accounts. Set minimum password length (for example, 12 characters), enable complexity rules, and configure account lockout after a small number of failed attempts (e.g., 5 attempts) to slow brute-force attacks.
  • Eliminate default and shared credentials: Change default passwords on routers, switches, firewalls, and IoT devices immediately when installed. Replace shared or generic accounts with unique service accounts; where local admin access is needed, use a tool like Microsoft LAPS or a password manager to rotate and centrally manage local administrator passwords.
  • Require device authentication/enrollment: Require company devices to be enrolled in an MDM/endpoint management solution (Microsoft Endpoint Manager/Intune, Jamf, etc.) before they can access file shares or email. For wired/wireless network access, use WPA2/WPA3-Enterprise or 802.1X where practical, or at minimum a VPN with device checks for remote access.
  • Control and authenticate service/process accounts: Avoid embedding plaintext credentials in scripts. Use managed service accounts, credential vaults, or OS-managed service accounts that require authentication when processes act on behalf of users. Restrict service accounts to the minimum permissions needed.
  • Enable logging and periodic review: Turn on authentication logs on domain controllers, VPNs, and perimeter devices. Review failed authentication attempts and unusual device connection events on a weekly basis to detect misconfigurations or attempted unauthorized access.

Example in a Small or Medium Business

A local engineering firm with 35 employees decides to meet this requirement. The IT lead, Alice, first applies a Group Policy that requires all domain users to have passwords at least 12 characters long, enforces complexity, and locks accounts after five failed logins. She replaces default admin credentials on the office router and the new NAS device, recording the new passwords in the company password manager. Laptops and phones must be enrolled in the company MDM before they can access email or mapped drives; devices not enrolled are placed on a separate guest VLAN with no access to internal resources. For shared tools that must run unattended, Alice creates managed service accounts and stores their credentials in the enterprise credential vault instead of hard-coding them in scripts. She also installs LAPS on Windows endpoints so local administrator passwords are unique and rotated automatically. Finally, Alice configures authentication logging on the domain controller and sets a weekly alert to review failed logins and new device enrollments so she can catch misconfigurations quickly.

Summary

Authenticating users, processes, and devices before granting access is a straightforward but essential control. For SMBs, combining a practical password policy, removal of default/shared credentials, device enrollment through an MDM, managed service accounts, and basic logging provides strong, achievable enforcement. Together these policy and technical measures ensure only verified identities and devices can access your systems, meeting the intent of the control while remaining realistic for a small IT team to implement and maintain.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes