🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use Automation and Tools to Satisfy FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Identifying Users, Processes Acting for Users, and Devices Efficiently

Practical automation and tooling approaches to reliably identify users, processes acting for users, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements.

•
April 20, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Meeting FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requires organizations to reliably identify who is accessing systems, which processes are acting on behalf of users, and which devices are involved — and the most practical way for small businesses to scale that capability is through automation and targeted tooling that produce searchable, auditable evidence.

Why automated identification matters for Compliance Framework

Manually tracking user accounts, service processes, and devices is error-prone and infeasible as environments grow (even a 25-person company quickly accumulates dozens of endpoints and cloud identities). The Compliance Framework requires verifiable identification so auditors can confirm only authorized users and devices have access to controlled unclassified information (CUI). Automation reduces human error, creates tamper-resistant logs, and generates the artifacts (audit logs, inventories, reports) auditors expect from FAR/CMMC assessments.

Key capabilities to automate

At a minimum, implement automated capabilities for: centralized identity and access (SSO/IAM), endpoint telemetry (EDR/MDM), process-level auditing (Sysmon/auditd/OS-level logging), network/device visibility (NAC or inventory), and centralized log aggregation and correlation (SIEM / log store). Together these map an authentication event to a process and to a device: for example, Azure AD sign-in (user identity) + Microsoft Defender ATP (process telemetry) + Intune (device inventory) + Splunk/Wazuh (correlation and retention) gives a complete chain of evidence.

Step-by-step implementation for a small business

1) Centralize authentication: deploy SSO/IAM (Azure AD, Okta, or Google Workspace) and require MFA for all accounts. 2) Enforce device enrollment: use an MDM (Intune, JAMF, or a lightweight MDM) so every laptop/phone has a unique device identifier and can be marked compliant/non-compliant. 3) Deploy endpoint telemetry: install an EDR agent (CrowdStrike, SentinelOne, or open-source tooling like osquery + Wazuh) to capture process creation events and process lineage. 4) Enable OS-level auditing: enable Sysmon on Windows with a standard config (process_create, network_connection, image_loaded) and auditd rules for Linux (execve, open). 5) Centralize logs and correlate: forward authentication, EDR, MDM, and network logs to a SIEM (Splunk, Elastic, QRadar, or Wazuh) and build correlation rules that link user -> process -> host using fields like username, uid, process_id, parent_process_id, host.hostname, and device_id. 6) Automate onboarding/offboarding: integrate HR system with IAM to automatically disable accounts and trigger device wipe/remove MDM enrollment on termination.

Real-world example: a 40-person subcontractor

A 40-person defense subcontractor used Azure AD (SSO + MFA), Intune for device management, and Microsoft Defender for endpoint telemetry. They enabled Azure AD sign-in logs, Defender process creation logs, and Intune device compliance events to be forwarded to an Elastic cluster. They implemented a correlation rule: when an Azure AD sign-in occurs, tag the sign-in event with device_id (from Intune) and then match Defender process_create events within the same host and time window. This allowed them to prove, for any sensitive file access, which user performed the action, which process executed it, and which device was used — all via automated dashboards and an exportable report to satisfy auditors.

Technical details and configuration pointers

Important technical details: enable timestamp synchronization (NTP) across endpoints and servers; normalize log fields (username, host, device_id, process_name, pid, parent_pid, event_id); and retain logs for the period required by policy (e.g., 90 days baseline for Level 1 evidence, confirm specific retention windows with your contracting officer). Example specifics: use Sysmon config to capture Event ID 1 (Process Create) and include CommandLine and ParentImage fields; for Linux, add auditd rule -a exit,always -S execve -F arch=b64 -k exec. In AWS/GCP, enable CloudTrail/Cloud Audit Logs and log management to capture user identity and API calls mapping to service accounts and instance IDs. Create SIEM queries that join authentication and process streams within a defined time-window (usually seconds to a few minutes) to associate user events to process events reliably.

Evidence, monitoring, and the risk of non-compliance

Evidence artifacts auditors will look for: a current user account inventory, device inventory (with device IDs), sample correlated log entries showing user -> process -> device, configurations for Sysmon/auditd/CloudTrail, MDM enrollment lists, and automated onboarding/offboarding records. Risks of not implementing these controls include unauthorized access to CUI, inability to demonstrate control during audits (leading to loss of contracts), and increased incident response time. Without automated correlation, investigations rely on manual forensics that are slow and often incomplete — increasing exposure and non-compliance findings.

Compliance tips and best practices

Use consistent naming conventions for service accounts (svc-*) and hostnames (org-dept-xx) to speed automated matching; minimize the number of privileged accounts and adopt role-based access; treat service accounts like users in logs and tag their processes; ensure device inventory IDs are recorded in authentication logs (e.g., device_id appended to SAML assertions or included in sign-in metadata); and schedule periodic attestations (quarterly) where managers verify active users and devices. Automate report generation for auditors: a weekly "active user-device-process" report that lists recent mapped events and highlights orphaned accounts or un-enrolled devices is highly valuable.

Summary: Implementing automated identity, endpoint telemetry, device enrollment, and centralized log correlation is the practical path for small businesses to satisfy FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V. Focus on SSO/MFA, MDM enrollment, EDR or process-level auditing (Sysmon/auditd), and a SIEM to join events. These measures provide verifiable, auditable chains showing which users, processes, and devices were involved in actions — reducing risk, speeding incident response, and producing the artifacts auditors expect.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes