🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Checklist for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Identify Information System Users, Processes Acting for Users, and Devices

Practical, step-by-step guidance to identify and document users, user-acting processes, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements for small contractors.

•
April 11, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This checklist translates the FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V control—identify information system users, processes acting for users, and devices—into an actionable, auditable sequence for small to mid-size contractors working under the Compliance Framework.

Why this control matters

At its core, IA.L1-B.1.V requires organizations to know who and what is operating on their information systems: real user identities, automated processes acting on behalf of users (service accounts, scheduled jobs, APIs), and the endpoint or device presenting credentials. For contractors handling Federal Contract Information (FCI) or Controlled Unclassified Information (CUI), this visibility is foundational to access control, incident detection, least privilege, and fulfilling audit and attestation obligations under FAR and CMMC.

Step-by-step checklist

Step 1 — Build an authoritative identity and device inventory

Start with a single source of truth (Compliance Framework CMDB or lightweight spreadsheet/CSV if small) that lists: user accounts (active/inactive), account type (human, service, privileged), device hostname, MAC and IP addresses, OS, owner, location, and credential type (password, certificate, SSO). Use automated discovery tools—Microsoft Azure AD Connect, Get-ADUser (PowerShell), 'dsquery' on AD, or cloud directory exports—to populate this inventory. Example: for Active Directory, run 'Get-ADUser -Filter * -Properties Enabled,LastLogonDate' to find stale accounts for cleanup.

Step 2 — Discover processes acting for users and map service accounts

Identify non-human identities by inventorying scheduled tasks, service accounts, API clients, CI/CD runners, and automation tools. Use endpoint queries like 'ps -ef' or Windows 'Get-Service' combined with log sources (Sysmon, Windows Event Logs ID 4688/4697) to show which processes run under which accounts. Document each service account with its purpose, owner, and allowed actions. For cloud APIs, export service principals or IAM roles and map them to resources they access.

Step 3 — Inventory and verify devices that access systems

Enumerate endpoints via DHCP logs, MDM/endpoint management (Intune, Jamf, ManageEngine), network access control (NAC) systems, or discovery tools (Lansweeper, osquery). For each device, capture device ID, OS version, last patch date, device compliance state (MDM-managed, encryption enabled), and associated user(s). Enforce device registration for access—require device certificates or MDM compliance checks before granting access to FCI systems.

Step 4 — Implement logging and mapping to link users, processes, and devices

Enable and centralize logs that include user account, process name, PID, and source device info. Key sources: AD authentication logs, VPN/NAC logs, endpoint telemetry (Sysmon/OSQuery), cloud provider audit logs, and application audit trails. Push logs to a central SIEM or log collector (Splunk, Elastic, Microsoft Sentinel, or a managed service). Configure correlation rules to map an authentication event to a specific user account, the process or client used, and the originating device IP/MAC, enabling forensic reconstruction.

Step 5 — Apply control mechanisms and periodic validation

Use technical controls: unique user IDs (no shared accounts), MFA for interactive access, role-based or attribute-based access controls, and least-privilege service accounts. Schedule quarterly reviews to validate the inventory and remove stale accounts/devices; run automated checks monthly to flag anomalies (multiple simultaneous logins from different geographies, workstations not enrolled in MDM). Maintain attestation records showing who reviewed the inventory and when—use ticketing/approval workflows to document changes.

Practical implementation details & small-business scenarios

Small business example: a 25-person firm running Windows AD synced to Azure AD with Office 365 and a handful of AWS resources. Practical steps: enable Azure AD Conditional Access to require compliant devices and MFA; deploy Intune to enroll devices and collect device IDs; use Azure AD sign-in logs and Intune inventory to map a user to a device; export AWS IAM role usage and tag roles with owners. Tools: Intune/Jamf for device management, osquery/System Center for process inventory, and a low-cost log collector (Elastic or cloud SIEM) for consolidation. For command-level checks, use PowerShell 'Get-EventLog -LogName Security -InstanceId 4624' to find interactive logons and associate them with device names.

Compliance tips, best practices, and risks of not implementing

Best practices: enforce unique accounts and avoid shared credentials; define naming conventions for devices and service accounts; automate discovery and onboarding (scripted exports to the CMDB); set retention policies for logs consistent with contract requirements (90 days or per regulatory guidance); and document policies that describe how accounts and devices are provisioned, reviewed, and decommissioned. Risks of not implementing IA.L1-B.1.V include undetected unauthorized access, inability to investigate incidents, excessive privilege creep, contract penalties or termination, and failing FAR/CMMC audits. Real incident scenario: a dormant service account running nightly backup scripts was co-opted to exfiltrate files—no mapping meant delayed detection and more severe contractual fallout.

Summary

Meeting FAR 52.204-21 / CMMC 2.0 IA.L1-B.1.V is practical and achievable: establish an authoritative inventory of users, service/process identities, and devices; automate discovery and logging; enforce device registration and unique user identities; and perform regular reviews with documented attestations. For small contractors, focus on low-cost automation (directory exports, MDM, basic SIEM) and clear policies—this combination provides demonstrable compliance evidence and materially reduces operational and contractual risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes