Skip to content

3.1.1 — Who Gets In

Limit system access to authorized users, processes acting on behalf of authorized users, and devices (including other systems).

You need three lists, and they need to be current:

  1. Every person who can log into your CUI systems — by name, not by team
  2. Every automated process (scheduled tasks, service accounts, API connections) — each one tied to a person who owns it
  3. Every device (workstations, phones, servers, printers) — each one approved and tracked

No shared logins. No mystery service accounts. No random laptops connecting to the network.

When someone leaves, their access dies the same day. When a device is decommissioned, it comes off the list. This is the foundation — everything else in Access Control builds on it.


Your assessor needs a “yes” to every row:

#QuestionWhat “yes” looks like
1Are your authorized users identified?A maintained list — not a stale spreadsheet from last year
2Are your authorized processes identified?Service accounts documented with an owner’s name
3Are your authorized devices identified?A device inventory from MDM or asset management
4Is access actually limited to those users?Unauthorized people can’t log in — prove it
5Is access actually limited to those processes?No rogue scripts or forgotten cron jobs
6Is access actually limited to those devices?Unregistered devices get blocked, not just logged

Documents they’ll review: Access control policy, account list with names, authorized device list, recent termination records, disabled account records, system audit logs

People they’ll talk to: Whoever manages accounts, your sysadmins, your security lead

Live demos they’ll ask for: “Show me how you create an account.” “Show me what happens when someone leaves.” “Plug in an unauthorized device — show me it’s blocked.”


These are the actual questions. Have answers ready.

  • “Show me your list of authorized users. How do you know it’s current?”
  • “Walk me through what happens when someone leaves the company.”
  • “How do you prevent unauthorized devices from connecting?”
  • “Show me a recent example of a disabled account after a termination.”
  • “Who owns this service account? What does it do?”

Shared accounts.admin@company.com” used by three people. The assessor will ask who performed a specific action, and you won’t be able to answer.

Ghost accounts. Former employees still in Active Directory months after leaving. Run a quarterly access review — compare your user list against HR’s active employee list.

Orphan service accounts. That SQL service account from 2019 that nobody remembers creating. Every automated process needs a documented owner.

No device inventory. You know your users but you can’t list every device on the network. Your MDM or asset management tool is the answer.



RequirementWhy it matters here
3.5.1 — Prove Who You AreGives you the identity foundation this control depends on
3.5.2 — Verify Before EntryVerifies identity before granting the access you control here
3.1.2 — What They Can DoOnce someone’s in, this limits what they can do
3.9.2 — When People LeaveThe offboarding process that feeds this control

Step-by-step setup for Microsoft 365 / Entra ID, AWS, Azure, and GCP — console steps, CLI commands, and evidence screenshots.


CMMC Practice ID: AC.L2-3.1.1 | SPRS Weight: 5 points | POA&M Eligible: No