🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to build a 7-step compliance checklist to identify information system users, processes acting on their behalf, and devices — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V

Practical 7-step checklist to identify users, processes acting on their behalf, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements.

March 27, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step 7-step checklist you can implement under the Compliance Framework to reliably identify information system users, processes acting on their behalf (service accounts, automated agents, OAuth apps), and devices — satisfying FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.V while remaining achievable for small businesses.

7-step Compliance Checklist

Step 1 — Establish a single authoritative identity source and export an initial user inventory

Create or designate an authoritative identity store (Active Directory, Azure AD, Google Workspace, or an IAM service) and export a current user list with attributes (username, email, account type, creation date, last sign-in, last password change, status). For on-prem AD run PowerShell: Get-ADUser -Filter * -Properties mail,Enabled,PasswordLastSet | Export-Csv Users.csv. For Azure AD use the AzureAD module or portal to export sign-in activity. This gives you a baseline to prove each user is uniquely identified and to detect duplicates or shared generic accounts.

Step 2 — Discover and enumerate processes acting on users' behalf

Identify non-human principals: service accounts, scheduled tasks, CI/CD agents, service principals, OAuth apps, API keys, and JWT clients. Techniques: scan for long-lived credentials, list scheduled tasks/crontabs on servers, enumerate cloud service principals (e.g., az ad sp list), review GitHub Actions and CI/CD secrets, and check SaaS admin consoles for connected apps. Flag credentials without expiration and map each service principal to an owner and purpose in your inventory.

Step 3 — Build a device inventory and classification

Capture every device that accesses systems: desktops, laptops, phones, tablets, servers, IoT. Use MDM/EMM (Microsoft Intune, JAMF, Google Endpoint, MobileIron) and endpoint agents (osquery, CrowdStrike sensor) to automatically collect device serial, OS, MAC addresses, hostname, last check-in, and managed/unmanaged status. For small businesses without MDM, perform a network scan (Nmap) and require device registration with a spreadsheet-backed CMDB until you can automate. Classify devices (corporate-owned, BYOD, contractor) and assign minimum configuration baselines.

Step 4 — Implement unique identifiers and eliminate shared credentials

Ensure each user and service principal has a unique identifier that is used consistently across logs and access controls. Prohibit generic shared logins (e.g., "admin", "sales") and replace with role-based access and service accounts with clear naming conventions (svc-ci-build, svc-backup) and documented owners. Enforce strong authentication: enable MFA for interactive access, use certificate-based or token-based auth for devices and services where appropriate, and set password rotation/expiration for non-service accounts.

Step 5 — Instrument logging and link logs to identities and device IDs

Configure audit logging for identity providers, endpoint OS events, VPNs, firewalls, and cloud APIs. Make sure logs include both the user identifier and device identifier (hostname, device ID, or certificate subject). For Windows, enable Sysmon with event forwarding to a SIEM; for cloud, forward Azure AD sign-in logs and Office 365 audit logs to Azure Sentinel or a third-party SIEM. Define retention (even basic CMMC Level 1 benefits from 90 days) and create automated alerts for anomalous use of service accounts or unknown devices.

Step 6 — Implement account and device lifecycle processes

Formalize onboarding, privilege assignment, and offboarding. Integrate HR and identity provisioning so new hires get unique accounts and departing staff immediately lose access (automated disable). For service processes, document purpose, owner, and expiry/rotation of credentials. Enforce device enrollment at onboarding and revoke certificates or MDM profiles at deprovisioning. Schedule periodic access reviews (quarterly for small shops) to validate that accounts and devices in your inventory are still needed.

Step 7 — Monitor continuously, validate with tests, and document evidence

Continuously monitor identity and device posture using automated checks: sign-in anomaly detection, certificate expiry alerts, detection of privileged actions by non-privileged accounts, and unauthorized device connections. Validate controls with periodic tests: run an internal audit that attempts to use a revoked device or expired service account and document results. Keep evidence (exported inventories, access review records, and logs) in a compliance folder mapped to the Compliance Framework control (IA.L1-B.1.V) for contract audits.

Practical tips, risks, and best practices

Tips and best practices: for a small business, prioritize quick wins — enforce MFA for all accounts, require MDM enrollment for corporate devices, and create a simple naming convention (user-firstinitial.lastname, svc-applicationname). Automate deprovisioning by integrating HR with your identity provider (use SCIM where supported). Use low-cost or built-in tools first: Azure AD Free + Intune trial for device enrollment, or open-source osquery for device visibility. Maintain a one-page runbook that maps identifiers to owners and contains steps for emergency revocation.

Risks of not implementing this requirement include inability to attribute actions (making incident response and forensic investigation ineffective), credential misuse by attackers (leading to lateral movement and data exfiltration), contractual noncompliance (fines or loss of DoD contracts), and operational risk from orphaned service accounts and unmanaged devices. Small businesses are attractive targets; lacking clear user/process/device identification materially increases compromise impact.

Summary: follow this 7-step checklist — authoritative identity source, enumerate service principals, device inventory, unique identifiers, logging with identity/device linkage, lifecycle governance, and continuous monitoring/testing — to build an auditable program that meets FAR 52.204-21 and CMMC 2.0 IA.L1-B.1.V expectations under the Compliance Framework. Start with the high-impact actions (MFA, inventory export, and disabling shared accounts), document everything, and iterate toward automation as your organization matures.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes