🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create an Inventory and Identification Process for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V: Checklist and Templates

Step-by-step guidance, checklist items, and reusable templates to build an inventory and identification process that meets FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V requirements for small businesses.

•
April 21, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step approach to building an inventory and identification process that satisfies FAR 52.204-21 and CMMC 2.0 Level 1 (IA.L1-B.1.V) expectations, with a reusable checklist and sample template fields you can adapt for a small business or contractor environment.

What the requirement means for your organization

At a high level, FAR 52.204-21 requires contractors to implement basic safeguarding of Federal contract information (FCI) and CMMC 2.0 Level 1 IA controls emphasize identification and authentication of users and devices that access FCI. For Compliance Framework practice purposes, that translates to two concrete obligations: (1) maintain an accurate, authoritative inventory of devices and identities that access contractor systems handling FCI; and (2) associate each identity and device with control attributes (owner, authorization status, access rights, and last validated date). The inventory must be usable as evidence during assessments and support operational controls such as least privilege, device isolation, and incident response.

Step-by-step inventory and identification process (practical checklist)

Use this checklist as a live process — not a one-time project. Core steps: 1) Appoint an inventory owner (role and backup); 2) Define scope (all endpoints, BYOD, servers, cloud workloads, network devices that can access FCI); 3) Choose discovery tools and manual processes; 4) Create the canonical inventory schema (see template below); 5) Run initial discovery and reconcile with known assets; 6) Assign owners and authorization status; 7) Implement continuous discovery and change detection (automated scans or MDM/NAC events); 8) Schedule periodic review and attestation (quarterly recommended for small businesses); 9) Secure the inventory (ACLs, encryption, audit logs); 10) Retain evidence and version history for assessments. Evidence items to collect: discovery scan results, change logs, approval records, and user attestations.

Example checklist items (copyable)

Sample actionable entries for a compliance checklist: "Inventory owner assigned and documented"; "Discovery tooling deployed to all network segments"; "Asset schema established with unique asset_id"; "All assets mapped to owners and business use-case"; "Unmanaged devices blocked or isolated"; "Quarterly attestation completed and signed by owners"; "Inventory stored in encrypted CMDB with access control." For each item add acceptance criteria (e.g., 100% of workstations have an inventory record, devices without records are isolated within 24 hours).

Templates and required fields

For small businesses a simple CSV or Google Sheet can be sufficient initially; for larger shops use a CMDB/ITAM tool. Minimum fields to include in your template: asset_id (GUID), device_type (laptop/phone/server), owner_name, owner_email, department, hostname, primary_ip, mac_address, serial_number, os_name, os_version, last_seen (timestamp), authorization_status (authorized/unauthorized/pending), FCI_access (yes/no), location, management_type (MDM/NAC/None), notes, evidence_link (scan/approval). Keep one additional field for "risk_notes" and "last_attestation_date". Exportable formats (CSV/JSON) help during audits.

Technical implementation details

Technical choices will depend on environment and budget: for BYOD and unmanaged endpoints, deploy Network Access Control (NAC) to block unknown devices; for managed devices use MDM (Intune, JAMF) to enforce enrollment and inventory reporting; for servers and cloud instances integrate discovery via cloud APIs (AWS, Azure) and configuration management (Ansible, SCCM). Open-source options for small budgets include OCS Inventory NG or GLPI for hardware/inventory and Nmap for network discovery. Configure continuous scans (daily or weekly) and alerts for new or unverifiable devices. Ensure inventory records have a cryptographic integrity mechanism (e.g., versioning and audit logs in a secured DB) and map identities to SSO/IdP attributes (email, employee_id) to demonstrate traceability for IA controls.

Real-world small-business scenarios

Scenario A: A 25-person engineering firm with mixed Windows/Mac devices and occasional contractor laptops. Start with a spreadsheet template populated from Intune/MDEP and DHCP logs, run a weekend Nmap sweep to find unmanaged devices, and onboard devices discovered to MDM or isolate them on a guest VLAN. Scenario B: A small subcontractor using cloud services — use cloud inventory APIs to populate the asset list and require SSH key registration and SSO for admin access. In both cases assign a named owner for each asset and require quarterly owner attestations via email and stored approvals to satisfy documentation requests during assessments.

Risks, compliance tips, and best practices

Risk of not implementing: unauthorized devices or accounts could access FCI, leading to data exfiltration, contract noncompliance, loss of future contracts, and regulatory penalties. Practical tips: start small and iterate (pilot with one department), automate what you can (MDM/NAC/IdP), enforce enrollment before granting access to FCI, and codify the inventory process in an internal policy. Best practices include tagging FCI-capable systems, retaining historical versions of the inventory for at least one assessment cycle, encrypting inventory data at rest, and integrating inventory events with SIEM or logging to detect suspicious changes (new device with FCI access, sudden owner change). Maintain an evidence binder (or directory) with scan exports, attestation emails, and approval records to present to assessors.

Summary: Building an inventory and identification process for FAR 52.204-21 and CMMC 2.0 Level 1 is achievable for small businesses by defining scope, selecting appropriate discovery and management tools, using a minimal but complete inventory schema, and operationalizing continuous discovery and periodic attestation; doing so reduces risk, creates audit-ready evidence, and strengthens your security posture while meeting Compliance Framework expectations.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes