{
  "title": "Step-by-Step Guide: Meeting FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V to Identify Users, Service Accounts, and Devices",
  "date": "2026-04-06",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/step-by-step-guide-meeting-far-52204-21-cmmc-20-level-1-control-ial1-b1v-to-identify-users-service-accounts-and-devices.jpg",
  "content": {
    "full_html": "<p>This post provides a practical, step-by-step plan for meeting FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.V (identify users, service accounts, and devices) tailored for small businesses operating under the Compliance Framework, with actionable tasks, example configurations, and evidence collection tips you can implement this week.</p>\n\n<h2>Understanding IA.L1-B.1.V and the specific Compliance Framework expectations</h2>\n<p>IA.L1-B.1.V requires you to uniquely identify and track the people and non-human identities (service accounts) and the devices that access, process, or store Controlled Unclassified Information (CUI) or other contractor information. For organizations following the Compliance Framework, this means maintaining a reliable inventory and identity mapping, enforcing unique identifiers for all user accounts, and ensuring service accounts and devices are discoverable, managed, and auditable. Implementation Notes: identify scope (systems, cloud tenants, endpoints), map identity stores, and document where evidence will be collected (logs, inventories, screenshots).</p>\n\n<h2>Step-by-step implementation (practical tasks)</h2>\n<h3>Step 1 — Create an authoritative identity and device inventory</h3>\n<p>Start by building a single authoritative inventory of: (a) human user accounts (employees, contractors), (b) service accounts (applications, scheduled jobs, APIs), and (c) devices (laptops, mobile devices, servers, IoT). For small businesses: export users from your identity provider (Azure AD: Azure AD -> Users -> Export; On-prem AD: Get-ADUser -Filter * | Select SamAccountName,Enabled,UserPrincipalName | Export-Csv) and devices from your UEM/MDM (Intune devices export, Jamf, or endpoint management console). Capture these fields: identifier, owner, location, account type, auth method, last login, and purpose. Store the inventory in a secure, versioned location (e.g., encrypted SharePoint/OneDrive with restricted access or a CSV in an access-controlled Git repository) as evidence for audits.</p>\n\n<h3>Step 2 — Classify and standardize accounts and naming conventions</h3>\n<p>Define account categories and enforce naming conventions so auditors and administrators can instantly tell account purpose: e.g., user-jdoe, svc-mssql-prod, svc-ci-github, dev-raspi-01. For Windows service accounts, use Group Managed Service Accounts (gMSA) where possible to avoid hard-coded passwords. For Linux/service containers, use a secrets manager (HashiCorp Vault, Azure Key Vault) and record the secret reference in the inventory. Implementation detail: require metadata fields for each account—owner, rotation schedule, expiration date, and privileged flag. This helps meet the Compliance Framework expectation for clear identification and lifecycle management.</p>\n\n<h3>Step 3 — Apply technical controls to enforce identity uniqueness and device enrollment</h3>\n<p>Enforce unique user IDs and prevent shared human accounts: configure your IdP (Azure AD, Okta) to block duplicate UPNs and disable shared credentials. Require device enrollment for corporate devices using a UEM (Microsoft Intune, VMware Workspace ONE): ensure each device has a unique device ID (hardware UUID, or endpoint certificate) and is listed in the inventory. For remote and SSH access, prefer certificate-based authentication or centrally managed SSH certificates rather than distributing long-lived keys. For service accounts, remove interactive login where not needed and use API keys stored in vaults with short TTLs. Implementation note: add Conditional Access rules or device compliance policies to block unmanaged devices from accessing email/cloud storage containing sensitive information.</p>\n\n<h3>Step 4 — Logging, monitoring, and periodic reconciliation</h3>\n<p>Configure logging for identity events: user creation, deletion, privilege changes, service account usage, and device enrollments. Centralize logs into a simple SIEM or cloud logging solution (Azure Monitor/Log Analytics, Google Chronicle, or a hosted Splunk instance). For small businesses, using Azure AD sign-in logs exported to a Log Analytics workspace is cost-effective. Implement a monthly (or quarterly) reconciliation process: compare IdP user list vs. HR/contractor rosters and device inventory vs. UEM exports; document discrepancies and remediation steps. Retain evidence of reconciliations and corrective actions in your System Security Plan (SSP) and Plan of Action & Milestones (POA&M) as required by the Compliance Framework.</p>\n\n<h2>Real-world example: small business with 25 employees using Microsoft 365</h2>\n<p>Scenario: a 25-person consultancy with Microsoft 365, Azure AD, a small on-prem NAS, and several Linux build servers. Practical implementation: export Azure AD users and devices (Azure Portal -> Azure Active Directory -> Users/Devices -> Export), create naming conventions (user-firstname.lastname, svc-buildserver-prod), migrate service account secrets into Azure Key Vault and assign managed identities to Azure resources, enroll all corporate laptops in Intune and require device compliance for access to SharePoint/OneDrive, and enable Sign-in logs to a Log Analytics workspace for retention. Evidence: screenshots of Intune device list, CSV export of Azure AD users, sample Key Vault access policies, and a reconciliation log showing HR vs. Azure AD with dates and responsible owner.</p>\n\n<h2>Risks of not implementing IA.L1-B.1.V and compliance tips</h2>\n<p>Failing to identify users, service accounts, and devices increases risk of unauthorized access, lateral movement, credential theft, data exposure, and audit failure—putting contracts and revenue at stake. Specific risks: a forgotten privileged service account with an unchanged password being used to exfiltrate data, unmanaged personal devices gaining access to email, or inability to demonstrate ownership/control of CUI during an assessment leading to loss of government contracts. Compliance tips: automate inventory exports where possible, implement least privilege, rotate and vault service account credentials, schedule quarterly reviews, and store evidence (exports, screenshots, tickets) alongside your SSP. Map each implemented control and evidence artifact to the Compliance Framework control IA.L1-B.1.V in your audit binder.</p>\n\n<p>Summary: meeting FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V in the Compliance Framework is fundamentally about visibility, standardization, and evidence. Start by building an authoritative inventory, classify and control accounts, enforce device enrollment and unique identities, log and reconcile regularly, and maintain clear documentation for audits. For small businesses, practical low-cost tools (IdP exports, Intune/UEM, a secrets vault, and centralized logging) are sufficient to meet the requirement when combined with a documented policy and a scheduled review process.</p>",
    "plain_text": "This post provides a practical, step-by-step plan for meeting FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.V (identify users, service accounts, and devices) tailored for small businesses operating under the Compliance Framework, with actionable tasks, example configurations, and evidence collection tips you can implement this week.\n\nUnderstanding IA.L1-B.1.V and the specific Compliance Framework expectations\nIA.L1-B.1.V requires you to uniquely identify and track the people and non-human identities (service accounts) and the devices that access, process, or store Controlled Unclassified Information (CUI) or other contractor information. For organizations following the Compliance Framework, this means maintaining a reliable inventory and identity mapping, enforcing unique identifiers for all user accounts, and ensuring service accounts and devices are discoverable, managed, and auditable. Implementation Notes: identify scope (systems, cloud tenants, endpoints), map identity stores, and document where evidence will be collected (logs, inventories, screenshots).\n\nStep-by-step implementation (practical tasks)\nStep 1 — Create an authoritative identity and device inventory\nStart by building a single authoritative inventory of: (a) human user accounts (employees, contractors), (b) service accounts (applications, scheduled jobs, APIs), and (c) devices (laptops, mobile devices, servers, IoT). For small businesses: export users from your identity provider (Azure AD: Azure AD -> Users -> Export; On-prem AD: Get-ADUser -Filter * | Select SamAccountName,Enabled,UserPrincipalName | Export-Csv) and devices from your UEM/MDM (Intune devices export, Jamf, or endpoint management console). Capture these fields: identifier, owner, location, account type, auth method, last login, and purpose. Store the inventory in a secure, versioned location (e.g., encrypted SharePoint/OneDrive with restricted access or a CSV in an access-controlled Git repository) as evidence for audits.\n\nStep 2 — Classify and standardize accounts and naming conventions\nDefine account categories and enforce naming conventions so auditors and administrators can instantly tell account purpose: e.g., user-jdoe, svc-mssql-prod, svc-ci-github, dev-raspi-01. For Windows service accounts, use Group Managed Service Accounts (gMSA) where possible to avoid hard-coded passwords. For Linux/service containers, use a secrets manager (HashiCorp Vault, Azure Key Vault) and record the secret reference in the inventory. Implementation detail: require metadata fields for each account—owner, rotation schedule, expiration date, and privileged flag. This helps meet the Compliance Framework expectation for clear identification and lifecycle management.\n\nStep 3 — Apply technical controls to enforce identity uniqueness and device enrollment\nEnforce unique user IDs and prevent shared human accounts: configure your IdP (Azure AD, Okta) to block duplicate UPNs and disable shared credentials. Require device enrollment for corporate devices using a UEM (Microsoft Intune, VMware Workspace ONE): ensure each device has a unique device ID (hardware UUID, or endpoint certificate) and is listed in the inventory. For remote and SSH access, prefer certificate-based authentication or centrally managed SSH certificates rather than distributing long-lived keys. For service accounts, remove interactive login where not needed and use API keys stored in vaults with short TTLs. Implementation note: add Conditional Access rules or device compliance policies to block unmanaged devices from accessing email/cloud storage containing sensitive information.\n\nStep 4 — Logging, monitoring, and periodic reconciliation\nConfigure logging for identity events: user creation, deletion, privilege changes, service account usage, and device enrollments. Centralize logs into a simple SIEM or cloud logging solution (Azure Monitor/Log Analytics, Google Chronicle, or a hosted Splunk instance). For small businesses, using Azure AD sign-in logs exported to a Log Analytics workspace is cost-effective. Implement a monthly (or quarterly) reconciliation process: compare IdP user list vs. HR/contractor rosters and device inventory vs. UEM exports; document discrepancies and remediation steps. Retain evidence of reconciliations and corrective actions in your System Security Plan (SSP) and Plan of Action & Milestones (POA&M) as required by the Compliance Framework.\n\nReal-world example: small business with 25 employees using Microsoft 365\nScenario: a 25-person consultancy with Microsoft 365, Azure AD, a small on-prem NAS, and several Linux build servers. Practical implementation: export Azure AD users and devices (Azure Portal -> Azure Active Directory -> Users/Devices -> Export), create naming conventions (user-firstname.lastname, svc-buildserver-prod), migrate service account secrets into Azure Key Vault and assign managed identities to Azure resources, enroll all corporate laptops in Intune and require device compliance for access to SharePoint/OneDrive, and enable Sign-in logs to a Log Analytics workspace for retention. Evidence: screenshots of Intune device list, CSV export of Azure AD users, sample Key Vault access policies, and a reconciliation log showing HR vs. Azure AD with dates and responsible owner.\n\nRisks of not implementing IA.L1-B.1.V and compliance tips\nFailing to identify users, service accounts, and devices increases risk of unauthorized access, lateral movement, credential theft, data exposure, and audit failure—putting contracts and revenue at stake. Specific risks: a forgotten privileged service account with an unchanged password being used to exfiltrate data, unmanaged personal devices gaining access to email, or inability to demonstrate ownership/control of CUI during an assessment leading to loss of government contracts. Compliance tips: automate inventory exports where possible, implement least privilege, rotate and vault service account credentials, schedule quarterly reviews, and store evidence (exports, screenshots, tickets) alongside your SSP. Map each implemented control and evidence artifact to the Compliance Framework control IA.L1-B.1.V in your audit binder.\n\nSummary: meeting FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V in the Compliance Framework is fundamentally about visibility, standardization, and evidence. Start by building an authoritative inventory, classify and control accounts, enforce device enrollment and unique identities, log and reconcile regularly, and maintain clear documentation for audits. For small businesses, practical low-cost tools (IdP exports, Intune/UEM, a secrets vault, and centralized logging) are sufficient to meet the requirement when combined with a documented policy and a scheduled review process."
  },
  "metadata": {
    "description": "Practical, step-by-step guidance for small businesses to meet FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V by identifying and managing users, service accounts, and devices.",
    "permalink": "/step-by-step-guide-meeting-far-52204-21-cmmc-20-level-1-control-ial1-b1v-to-identify-users-service-accounts-and-devices.json",
    "categories": [],
    "tags": []
  }
}