Identification sounds simple until you sit in the assessment room. The assessor asks a straightforward question: “Who has access to your CUI systems and how do you prove it?” And then you realize your inventory is scattered across email, a spreadsheet from 2024, and someone’s institutional knowledge. IA.L2-3.5.1 means you define who and what has access, document it, and keep that documentation current.
This overlaps heavily with your access control (AC) work. Once you have identification nailed down, AC practices become a formality. If you can’t clearly identify your users and devices, you can’t explain access control to the assessor. AC.L2-3.1.1 and AC.L2-3.1.2 both depend on having clear user and device identification in place.
What the assessor is actually evaluating
The assessor isn’t checking if you have a perfect inventory. They’re checking if you know who’s in your environment and if that knowledge is current. When they ask “who has administrative access,” you should be able to pull up a document and show them a list with names, account purposes, and a review date. Not a guess. Not “let me ask the network guy.” A document.
Most small contractors mix users across multiple systems: on-premises Active Directory, Microsoft 365, local machine accounts, cloud accounts, service accounts. The assessor needs to understand you’ve mapped all of that. You don’t have to use a single system for identity management (though that’s ideal), but you do have to maintain a unified view of who exists across all your systems.
For devices, same principle. You need to know what’s on your network and what’s authorized. This is where your asset inventory ties in. The device inventory doesn’t live in a vacuum. It connects to your CUI boundary definition, your access control matrix, your patch management, and your change management processes. Your device identification feeds directly into authentication requirements (see IA.L2-3.5.2) and audit logging (see AU.L2-3.3.1).
What a realistic SSP definition looks like
Practice IA.L2-3.5.1: Identification of Users, Processes, and Devices
We maintain current identification records for all individuals, processes, and devices with access to systems containing CUI. This includes:
Users: All employees and contractors are provisioned in Active Directory with unique user accounts. Accounts are created using a ticket-based process documented in our Access Control policy. Each account includes the user’s legal name, title, department, and manager name. Department managers review all active accounts in their area quarterly via the AD account review ticket. The most recent review was completed on [date].
Processes and Service Accounts: Non-interactive service accounts are documented in a separate registry with account name, purpose, and systems accessed. This registry is reviewed by the IT manager quarterly. Service account purposes are tied to documented business functions (backup, monitoring, scheduled maintenance). The registry is stored in [shared location] and reviewed on [date].
Devices: All desktop, laptop, and server devices deployed in the organization are tracked in our device inventory. Devices are registered at provisioning and decommissioned when taken out of service. Device records include hostname, serial number, hardware type, OS, owner/assigned user, and deployment date. The current inventory contains [number] authorized devices and is updated monthly by the network administrator.
All identification records are reviewed for accuracy and current status every [quarter/semi-annual]. Accounts for terminated employees are disabled within one business day of separation per the Termination SOP. Devices are decommissioned when they reach end-of-life or are no longer authorized.
Notice the specific language: account review is quarterly, service accounts are documented with purpose, devices include an owner. This matters. The assessor reads this and knows exactly what to ask for and what to check. Vague SSP language leads to follow-up questions. Clear language gets you through faster.
How to present your evidence
- Current user inventory or Active Directory listing with titles/purposes
- Device inventory with device names, types, OS, owners, and status
- Service account registry documenting purpose and access
- Evidence of periodic review (tickets, sign-offs, audit dates)
You need three artifacts ready:
Current user inventory or directory listing. Pull from Active Directory. Show user accounts, their job titles/purposes, and the date the report was generated. Include service accounts with their descriptions.
Device inventory. A spreadsheet or asset management tool export showing device name, device type, OS, owner, and current status. The date matters. If the last update was six months ago, expect questions.
Evidence of review process. A ticket, meeting notes, or sign-off document showing that someone reviewed the user and device list on the schedule you documented. Don’t overthink this. A quarterly ticket that says “AD account review completed, verified 47 active accounts, 0 anomalies” is enough.
Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.
Common failures
Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.
If you use an MSP or MSSP
Your MSP or MSSP should be maintaining your directory services and device management. They own the day-to-day. This doesn’t mean they own identification in the compliance sense. You own the process definition in your SSP and you own the review.
What that means operationally: your MSSP manages your Active Directory and device inventory. They push updates. You do the quarterly review. Your SSP documents what you review and when. The MSSP can speak to the technical side (how accounts are provisioned, how devices are registered) in the assessment. You speak to the business side and the review process.
If your MSSP also handles your compliance program management, they’ll be preparing the review artifacts and probably running the review itself. Either way, the MSSP should be able to walk the assessor through their account provisioning process and show logs of user and device changes if asked.
This guidance is based on assessment room experience and reflects one practitioner’s interpretation of CMMC Level 2 requirements. It is not legal or compliance advice. Always consult your compliance team and official CMMC documentation for final guidance.