If IA.L2-3.5.1 is about knowing who is trying to access your systems, then IA.L2-3.5.2 is about verifying they really are who they claim to be.
As a Certified CMMC Assessor and Certified CMMC MSP, we often find that organizations rely on weak or inconsistent authentication—especially for service accounts, scripts, or cloud apps. But CMMC Level 2 requires formal, provable authentication for all users, processes, and devices before granting access.
Let’s break it down.
CONTROL:
IA.L2-3.5.2 – Authenticate (or verify) the identities of users, processes, or devices, as a prerequisite to allowing access to organizational systems.
Assessment Objectives (from the CMMC Assessment Guide):
- Identities of users are authenticated prior to access.
- Identities of processes acting on behalf of users are authenticated prior to access.
- Identities of devices are authenticated prior to access.
MSP Perspective: How to Implement It
Identification without authentication is just guessing. You need to verify identity before granting any access.
- Authenticate Users
- Use centralized identity providers like Azure AD, Entra ID, or Okta.
- Enforce multi-factor authentication (MFA) for all privileged and remote access.
- Ban shared logins and default credentials.
- Authenticate Processes
- Require API keys, certificates, or signed tokens for services or automated processes.
- Track each service account and require strong authentication methods.
- Rotate secrets and tokens regularly.
- Authenticate Devices
- Implement device-based authentication using Intune, MDM, or NAC tools.
- Use Conditional Access Policies that check device compliance (e.g., encryption, patch status) before allowing access.
- Block unknown or unmanaged devices from sensitive systems or cloud access.
Tip: Make access conditional—not just on identity, but also on device health, location, and role.
What fails:
- Local logins with no password
- Scripts running with embedded plaintext credentials
- BYOD devices accessing without registration
What passes:
- MFA for all users
- Certificates or tokens for services
- Device-based authentication with access policies enforced
Common Pitfalls
- MFA enabled for only some users
- Devices allowed to connect to cloud apps or VPN without verification
- Automated processes using hardcoded or shared credentials
Final Guidance
Trust must be earned—and in cybersecurity, trust starts with authentication. If someone (or something) is accessing your systems without proving their identity, you’re not compliant—and you’re not secure.


