🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Guide: Meeting FAR 52.204-21 / CMMC 2.0 Level 1 - Control - IA.L1-B.1.V to Identify Users, Service Accounts, and Devices

Practical, step-by-step guidance for small businesses to meet FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V by identifying and managing users, service accounts, and devices.

•
April 06, 2026
•
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides a practical, step-by-step plan for meeting FAR 52.204-21 and CMMC 2.0 Level 1 control IA.L1-B.1.V (identify users, service accounts, and devices) tailored for small businesses operating under the Compliance Framework, with actionable tasks, example configurations, and evidence collection tips you can implement this week.

Understanding IA.L1-B.1.V and the specific Compliance Framework expectations

IA.L1-B.1.V requires you to uniquely identify and track the people and non-human identities (service accounts) and the devices that access, process, or store Controlled Unclassified Information (CUI) or other contractor information. For organizations following the Compliance Framework, this means maintaining a reliable inventory and identity mapping, enforcing unique identifiers for all user accounts, and ensuring service accounts and devices are discoverable, managed, and auditable. Implementation Notes: identify scope (systems, cloud tenants, endpoints), map identity stores, and document where evidence will be collected (logs, inventories, screenshots).

Step-by-step implementation (practical tasks)

Step 1 — Create an authoritative identity and device inventory

Start by building a single authoritative inventory of: (a) human user accounts (employees, contractors), (b) service accounts (applications, scheduled jobs, APIs), and (c) devices (laptops, mobile devices, servers, IoT). For small businesses: export users from your identity provider (Azure AD: Azure AD -> Users -> Export; On-prem AD: Get-ADUser -Filter * | Select SamAccountName,Enabled,UserPrincipalName | Export-Csv) and devices from your UEM/MDM (Intune devices export, Jamf, or endpoint management console). Capture these fields: identifier, owner, location, account type, auth method, last login, and purpose. Store the inventory in a secure, versioned location (e.g., encrypted SharePoint/OneDrive with restricted access or a CSV in an access-controlled Git repository) as evidence for audits.

Step 2 — Classify and standardize accounts and naming conventions

Define account categories and enforce naming conventions so auditors and administrators can instantly tell account purpose: e.g., user-jdoe, svc-mssql-prod, svc-ci-github, dev-raspi-01. For Windows service accounts, use Group Managed Service Accounts (gMSA) where possible to avoid hard-coded passwords. For Linux/service containers, use a secrets manager (HashiCorp Vault, Azure Key Vault) and record the secret reference in the inventory. Implementation detail: require metadata fields for each account—owner, rotation schedule, expiration date, and privileged flag. This helps meet the Compliance Framework expectation for clear identification and lifecycle management.

Step 3 — Apply technical controls to enforce identity uniqueness and device enrollment

Enforce unique user IDs and prevent shared human accounts: configure your IdP (Azure AD, Okta) to block duplicate UPNs and disable shared credentials. Require device enrollment for corporate devices using a UEM (Microsoft Intune, VMware Workspace ONE): ensure each device has a unique device ID (hardware UUID, or endpoint certificate) and is listed in the inventory. For remote and SSH access, prefer certificate-based authentication or centrally managed SSH certificates rather than distributing long-lived keys. For service accounts, remove interactive login where not needed and use API keys stored in vaults with short TTLs. Implementation note: add Conditional Access rules or device compliance policies to block unmanaged devices from accessing email/cloud storage containing sensitive information.

Step 4 — Logging, monitoring, and periodic reconciliation

Configure logging for identity events: user creation, deletion, privilege changes, service account usage, and device enrollments. Centralize logs into a simple SIEM or cloud logging solution (Azure Monitor/Log Analytics, Google Chronicle, or a hosted Splunk instance). For small businesses, using Azure AD sign-in logs exported to a Log Analytics workspace is cost-effective. Implement a monthly (or quarterly) reconciliation process: compare IdP user list vs. HR/contractor rosters and device inventory vs. UEM exports; document discrepancies and remediation steps. Retain evidence of reconciliations and corrective actions in your System Security Plan (SSP) and Plan of Action & Milestones (POA&M) as required by the Compliance Framework.

Real-world example: small business with 25 employees using Microsoft 365

Scenario: a 25-person consultancy with Microsoft 365, Azure AD, a small on-prem NAS, and several Linux build servers. Practical implementation: export Azure AD users and devices (Azure Portal -> Azure Active Directory -> Users/Devices -> Export), create naming conventions (user-firstname.lastname, svc-buildserver-prod), migrate service account secrets into Azure Key Vault and assign managed identities to Azure resources, enroll all corporate laptops in Intune and require device compliance for access to SharePoint/OneDrive, and enable Sign-in logs to a Log Analytics workspace for retention. Evidence: screenshots of Intune device list, CSV export of Azure AD users, sample Key Vault access policies, and a reconciliation log showing HR vs. Azure AD with dates and responsible owner.

Risks of not implementing IA.L1-B.1.V and compliance tips

Failing to identify users, service accounts, and devices increases risk of unauthorized access, lateral movement, credential theft, data exposure, and audit failure—putting contracts and revenue at stake. Specific risks: a forgotten privileged service account with an unchanged password being used to exfiltrate data, unmanaged personal devices gaining access to email, or inability to demonstrate ownership/control of CUI during an assessment leading to loss of government contracts. Compliance tips: automate inventory exports where possible, implement least privilege, rotate and vault service account credentials, schedule quarterly reviews, and store evidence (exports, screenshots, tickets) alongside your SSP. Map each implemented control and evidence artifact to the Compliance Framework control IA.L1-B.1.V in your audit binder.

Summary: meeting FAR 52.204-21 / CMMC 2.0 Level 1 IA.L1-B.1.V in the Compliance Framework is fundamentally about visibility, standardization, and evidence. Start by building an authoritative inventory, classify and control accounts, enforce device enrollment and unique identities, log and reconcile regularly, and maintain clear documentation for audits. For small businesses, practical low-cost tools (IdP exports, Intune/UEM, a secrets vault, and centralized logging) are sufficient to meet the requirement when combined with a documented policy and a scheduled review process.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes