🚨 CMMC Phase One started November 10! Here's everything you need to know →

Implementation Checklist: Identifying Users, Processes Acting on Behalf of Users, and Devices for FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V

Step-by-step checklist to inventory and identify users, agent/service processes acting on behalf of users, and devices to meet FAR 52.204-21 and CMMC 2.0 Level 1 identification requirements.

•
April 12, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Identifying who (users), what (processes or services acting on behalf of users), and which devices access your covered contractor information systems is one of the simplest but most frequently incomplete tasks in meeting FAR 52.204-21 and CMMC 2.0 Level 1 IA.L1-B.1.V — this post gives a practical, small-business-focused implementation checklist you can execute this quarter to produce audit-ready evidence and reduce real operational risk.

Scope and key objective

Your objective under the Compliance Framework is to produce a repeatable inventory and authoritative mapping that answers three questions for each access actor: (1) Is this a human user, (2) Is this a process/service acting on behalf of a human (or another system), and (3) Which device(s) are used? The inventory must be accurate, owned, and regularly reviewed. For small organizations this typically covers Active Directory/Azure AD identities, cloud service principals, service accounts, IoT/OT devices, mobile endpoints, and contractor/third-party accounts.

Implementation checklist (actionable steps)

1) Discover identity sources and build an authoritative identity registry

List every identity provider (IdP) and identity store: on-prem AD, Azure AD, Okta, Google Workspace, AWS IAM, GitHub orgs, and any LDAP directories. Export canonical attributes for each account (username, objectGUID/UID, email, employeeID, account type, creation date, last login). For Windows AD use: Get-ADUser -Filter * -Properties whenCreated,lastLogonTimestamp,employeeID; for Azure AD use MS Graph or AzureAD PowerShell (Get-AzureADUser). Consolidate exports into a single CSV/CMDB record with an owner field and a risk tag (privileged/non-privileged/contractor/service).

2) Identify processes & service identities acting on behalf of users

Enumerate service accounts, API clients, OAuth apps, CI/CD runners, automation bots, and scheduled tasks. Query cloud tenants for service principals (Azure: Get-AzADServicePrincipal; AWS: list IAM users/roles with tags), scan repositories for PATs/secrets, and inspect job schedules (cron, Task Scheduler, Jenkins agents). Tag each as "process-acting-for-user" if the principal performs user-driven actions (e.g., a build agent pushing artifacts on behalf of devs) and record where secrets/keys are stored (vaulted or plaintext).

3) Inventory devices and map to users/processes

Use your MDM (Intune, Jamf), NAC solution, or endpoint management (SCCM/Endpoint Manager) to export device lists with device IDs, OS, last check-in, owner, and compliance state. For unmanaged networks, run network discovery (Nmap with service detection), SNMP sweeps, or use an agent (Wazuh, CrowdStrike) to identify IoT and legacy devices. Link devices to user accounts where possible (mobile device owner, AD logged-on user, SSH key owner) and classify device types (workstation, server, printer, IoT) for risk prioritization.

4) Assign ownership, implement lifecycle controls, and document evidence

For every recorded user/process/device assign a single owner (role or person) responsible for onboarding, offboarding, and quarterly reviews. Implement provisioning/deprovisioning workflows integrated with HR (e.g., automatic disable on termination). Ensure service accounts use centralized credential stores (Azure Key Vault, HashiCorp Vault, CyberArk) with rotation policies and that privileged accounts are MFA-protected or require jump hosts. Produce exportable evidence artifacts: CSVs from IdP, screenshots of MDM exports, service principal lists, and SIEM events showing authentication activity.

Technical details, small-business scenarios, and real-world examples

Example A — 40-person engineering shop: On-prem AD synchronized to Azure AD with Intune-managed laptops and GitHub-hosted CI. Action plan: (a) Run Get-ADUser and Get-AzureADUser exports, (b) list GitHub Actions runners and org-level secrets, (c) use Intune to export device inventory and map owner UPNs, (d) rotate all long-lived GitHub PATs and move secrets into Azure Key Vault with access policies limited to the runner's managed identity. Use a script to match device lastLogon to user lastLogin to catch orphaned devices. Evidence: AD export + Intune CSV + GitHub org audit log.

Compliance tips and best practices

Enforce naming conventions (svc- prefix for service accounts, CON- or CTOR- for contractors), require all non-human identities to be labeled in the IdP with "service" and a justification, and enforce least privilege by mapping each identity to roles with narrowly defined permissions. Automate reviews: schedule a quarterly entitlement review via a workflow that emails owners a list and requires affirmation or remediation. Instrument controls: emit identity lifecycle events to your SIEM and create alerts for new high-privilege account creation or service principal consent grants. Use secrets scanners (GitGuardian, truffleHog) to find credentials accidentally checked into repositories.

Risk of not implementing this requirement

Without an accurate mapping of users, processes, and devices you face elevated risks: unauthorized access via orphaned accounts or unmanaged devices, undetected service-account misuse, lateral movement after breach, and failure to evidence controls during audits leading to contract penalties or lost bids. Small businesses often suffer the worst impact because a single privileged orphaned credential or exposed token can give attackers immediate access to proprietary data and contractor systems.

Summary: Execute this checklist by discovering all identity sources, cataloging service/process accounts, inventorying devices and mapping ownership, enforcing lifecycle controls and vaulting credentials, and producing audit-ready exports and SIEM alerts. For a small business the highest-impact quick wins are consolidating identity sources, vaulting service secrets, enabling MDM, and instituting quarterly entitlement reviews — these actions both reduce risk and directly support FAR 52.204-21 / CMMC IA.L1-B.1.V compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes