🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Asset and Identity Inventory to Identify Users, Processes, and Devices for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V

Step-by-step, practical guide for building an asset, identity, and process inventory to meet FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements for small businesses.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Creating a usable asset and identity inventory is the foundation of meeting FAR 52.204-21 and CMMC 2.0 Level 1 (Control IA.L1-B.1.V), because you cannot manage or protect what you cannot identify—users, processes, and devices must be discoverable, documented, and tied to owners, roles, and data flows to satisfy compliance and reduce risk.

Why an asset and identity inventory matters for Compliance Framework requirements

Under the Compliance Framework practice, IA.L1-B.1.V requires organizations to identify users, processes, and devices interacting with controlled unclassified information (CUI) or government systems. Practically, this means producing an up-to-date inventory that maps identities (human and service accounts), endpoints (laptops, servers, printers, IoT), and runtime processes/services (daemons, scheduled jobs, API clients) to business owners and data classifications. This inventory supports access control, incident response, least-privilege enforcement, and audit evidence for FAR and CMMC auditors.

Practical implementation: scope, data model, and governance

Start by scoping: include all systems that store, process, or transmit CUI, plus systems that authenticate users (Active Directory/Azure AD/OAuth providers). Define a minimal data model for each asset and identity record: for assets include asset_id, hostname, MAC, IP, OS/version, location, owner, business function, CUI presence (yes/no), last-seen timestamp, management tool (e.g., Intune, Jamf, SCCM); for identities include user_id, display_name, role, entitlement level, MFA status, provisioning source, last_login, linked assets, and service-account tag. For processes include process_id, service account, binary name, listening ports, associated host, and whether it accesses CUI. Document who owns each record and how updates are authorized (change control / ticketing integration).

Discovery and tooling: automated collection and reconciliation

Automate discovery with a combination of directory queries, endpoint telemetry, network scanning, cloud APIs, and agent-based tooling. Examples: use PowerShell AD queries (Get-ADUser -Filter * -Properties lastLogonDate,memberOf) or Azure CLI (az ad user list) to enumerate identities; use Schedule/intune or SCCM inventories to pull installed OS/software; run network scans with nmap -sP 192.168.1.0/24 for unmanaged endpoints; deploy osquery or Wazuh agents to collect running processes and persisting services (e.g., select name, path, uid from processes). For cloud, run aws iam list-users and aws ec2 describe-instances to map cloud identities and assets. Integrate results into a CMDB (ServiceNow, open-source CMDB, or even a structured spreadsheet backed by automation) and create reconciliation jobs that run daily to mark stale entries and flag new/unmanaged hosts.

Example commands and small technical details

Useful, actionable commands you can run as a small business: PowerShell to list machines from AD: Get-ADComputer -Filter * -Properties Name,OperatingSystem,LastLogonDate | Export-Csv computers.csv; osquery example to list processes: SELECT pid, name, path, cmdline, uid FROM processes;; AWS: aws iam list-users --output json. Use these outputs to populate CSV fields in your inventory, then import into your CMDB or a simple database. Schedule these commands via cron/Task Scheduler and verify diffs to detect unapproved asset additions.

Small business scenario: a 50-employee example

For a 50-employee organization with Office365, a handful of Linux servers, and contractor-managed printers/IoT, practical steps are: 1) inventory Office365 users via Graph API to capture identities and MFA state; 2) run Intune/MDM enrollment checks to list managed endpoints and their policy compliance; 3) deploy osquery on critical servers to enumerate running services that access company data (backup agents, SSH, web services) and tag each with a data classification; 4) record third-party SaaS that hold CUI (payroll, HR) and list service accounts used for API access; 5) assign owners in a simple spreadsheet or CMDB and require owners to confirm inventory monthly. This approach keeps the effort affordable while aligning with compliance expectations.

Compliance tips and operational best practices

Prioritize assets that store or transmit CUI first; you can use a tiered inventory approach (Tier 1: CUI systems, Tier 2: business-critical systems, Tier 3: peripheral devices). Enforce unique, auditable service accounts for processes and disable generic shared accounts. Enable and track MFA status and last-login for users. Integrate inventory data with your IAM and SIEM so that when a device or account falls out of compliance (no MDM, no MFA, outdated OS), automated workflows will quarantine or notify owners. Retain historical snapshots of inventories for at least the duration required by contract (often 3–6 years) to demonstrate continuous compliance and detection capability.

Risks of not implementing this inventory

Without a reliable inventory, you risk unauthorized access to CUI, unnoticed rogue devices, unmanaged service accounts that become attack paths, and inability to demonstrate control during audits for FAR 52.204-21 or CMMC. Practically, this can cause breaches, contract termination, costly remediation, and lost trust. From an operational standpoint, incident response and root-cause analysis are slowed without mappings from users/processes to assets, increasing dwell time for attackers.

In summary, building a compliance-grade asset and identity inventory is a practical, iterative effort: define a focused data model, automate discovery using directory queries, agents, and cloud APIs, reconcile and assign owners, and integrate with IAM/MDM/SIEM to enforce policies. Start by inventorying CUI-bearing systems, use free or low-cost tools where appropriate, and institutionalize monthly reconciliation and change-control to maintain the inventory—this will put you on a clear path to meeting FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes