🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

Implementing FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Practical Checklist for Identifying Users, Processes, and Devices

Step-by-step practical checklist to identify and track users, processes, and devices to meet FAR 52.204-21 / CMMC 2.0 Level 1 requirements under the Compliance Framework.

β€’
April 19, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, hands-on checklist for meeting IA.L1-B.1.V (identifying users, processes, and devices) under the Compliance Framework for FAR 52.204-21 / CMMC 2.0 Level 1 β€” focused on small businesses that need straightforward, repeatable steps to inventory, uniquely identify, and authenticate accounts, services, and endpoints before granting access to Controlled Unclassified Information (CUI) or contractor-controlled data.

What the control requires (high level)

At its core, IA.L1-B.1.V requires that every actor β€” human user, automated process, and managed device β€” be uniquely identified and authenticated prior to being allowed access to systems and data in scope. For Compliance Framework implementation this means: assign unique IDs, document service/process identities, maintain an enforceable device inventory, and ensure authentication is in place (passwords, certificates, keys, or federated identity with MFA where possible). The goal is traceability: when an event occurs you can map it back to a specific user, process, or device.

Practical implementation checklist

Use the following checklist as an implementation sequence you can follow this week. Each item includes suggested tools and small-business-friendly options: 1) Create/maintain an identity registry (CMDB) that records user ID, role, status, assigned devices, and authentication method β€” start with a protected spreadsheet or use free tiers of NetBox/Lansweeper; 2) Enforce unique accounts β€” disable shared logins and create named service accounts for automated processes; 3) Inventory devices by hostname, MAC, serial, OS, UUID, and ownership β€” collect DHCP lease logs, ARP tables, and run endpoint discovery (nmap, lansweeper agent, osquery); 4) Inventory running processes and services on servers and endpoints β€” use tasklist/ps/systemd and capture service names, service account, executable path, and listening ports into your registry; 5) Ensure authentication mechanisms exist β€” domain accounts (Azure AD/AD), local accounts with documented password policies, device certificates, or SSH keys; 6) Implement basic enforcement β€” join endpoints to domain or MDM (Intune/Jamf), enforce device compliance checks (antivirus, disk encryption); 7) Configure logging and correlation β€” send Windows Events/Syslog to a central collector (WEF + Elastic/Splunk/Graylog) and retain appropriate logs for investigations; 8) Add lifecycle controls β€” onboarding, transfer, offboarding workflows that include account/device assignment and removal rules (disable within 24–72 hours of separation). Each checklist item should be assigned an owner and a target completion date in your Compliance Framework program.

Technical details and examples

Technical specifics help small teams implement this without overengineering: use username@company (or UPN) for unique IDs; configure Azure AD or OpenLDAP as the authoritative identity store; use certificates (SCEP/ACME) for device identity and 802.1X or MDM for network access control; store service account credentials in a vault (HashiCorp Vault, KeePass/Bitwarden in business plan) with auditing enabled; discover processes with osquery (select name, pid, uid, cmdline from processes) and export to your CMDB; standardize process/service naming conventions like svc-db-readonly or svc-billing-api and map them to their host and container image digest (sha256) so you can tie events to immutable artifacts. For SSH keys, enforce a key lifecycle policy (rotate every 90 days) and use centralized authorized_keys management via configuration management (Ansible) or SSH certificate authorities; for Windows service accounts, avoid running services as LocalSystem β€” create managed service accounts with least privilege.

Small business scenarios and real-world examples

Example 1: A 25-person engineering firm with one Windows server and 30 laptops. Quick wins: enable Azure AD Join for laptops, deploy Intune for basic MDM, create a spreadsheet-driven CMDB that maps user UPNs to device serial numbers, and configure Windows Event Forwarding to a low-cost Elastic stack. Example 2: A small SaaS shop using Linux hosts and containers. Use osquery on hosts, collect container image digests, label Kubernetes ServiceAccounts with team ownership, and enforce node authentication with certificates; store service account secrets in Vault and require pull secrets tied to image registries. Example 3: A hybrid office with printers, VoIP phones and IoT sensors. Include non-workstation devices in the inventory (model, firmware, management IP), segment them on a separate VLAN, and require NAC or firewall rules so unidentified devices cannot reach CUI systems. These are practical steps you can implement within weeks and scale as your Compliance Framework program matures.

Compliance tips, best practices, and operational controls

Best practices to make identification sustainable: document naming conventions and onboarding/offboarding playbooks in your Compliance Framework documentation; automate discovery with scheduled scripts or agents and reconcile differences weekly; enforce multifactor authentication for all interactive user access and require device compliance (disk encryption + EDR) for device access to CUI; run periodic audits (quarterly) to ensure that service accounts are still needed and that stale devices are removed; implement role-based access controls so that identity mapping directly supports entitlement reviews. Keep a simple SLA for account disablement (e.g., 24 hours for termination, 72 hours for role changes) and log every change to the identity registry with who, when, and why.

Risk of not implementing IA.L1-B.1.V

Failure to uniquely identify and authenticate users, processes, and devices creates immediate and measurable risks: unauthorized access, inability to investigate incidents (no forensic trail), increased lateral movement risk from compromised unattended devices or generic accounts, and likely non‑compliance in audits leading to contract loss or remedial action under FAR 52.204-21 and CMMC. For a small business this can mean losing government contracts, having to undertake expensive remediation, or suffering reputational and financial damage from a breach that could have been prevented with basic identity and inventory controls.

In summary, focus on establishing an authoritative identity registry, instrumenting automated discovery for devices and processes, enforcing unique identities and authentication, and operationalizing lifecycle and logging controls. Start small with manual records and inexpensive tooling, assign clear owners for each checklist item, and iterate toward automation β€” these steps will satisfy IA.L1-B.1.V requirements while materially reducing your exposure and improving your Compliance Framework posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes