🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Compliant Onboarding and Offboarding Process for Personnel: Implementation Checklist for Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-1

Practical, step-by-step checklist and technical controls to build compliant onboarding and offboarding processes that meet ECC – 2 : 2024 Control 1-9-1 requirements for small businesses.

April 17, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Onboarding and offboarding are not just HR tasks — they are core security controls required by Compliance Framework ECC – 2 : 2024 (Control 1-9-1) to ensure that personnel are granted appropriate access quickly and that access is removed immediately upon role changes or departures; this post gives a practical, auditable checklist and real-world implementation steps a small business can follow today.

Implementation checklist overview (Compliance Framework – Control 1-9-1)

At a high level, Compliance Framework Control 1-9-1 requires documented, repeatable processes for granting, adjusting, and revoking access tied to a person’s role and employment status; evidence of identity verification and training; coordination between HR, IT, and security; and retention of records demonstrating compliance. Your checklist should cover pre-boarding identity verification, role-based access mapping, day-one provisioning (accounts, MFA, devices), periodic access reviews, offboarding checklists, and secure disposal or reassignment of assets and secrets.

Pre-boarding and role definition (what to implement before hiring)

Before offering employment, define the job role and the least-privilege access required: create a Role Access Matrix that maps job titles to specific groups, applications, and privilege levels. Require background checks and signed policy acknowledgements as part of offer acceptance. For a small business, a practical step is a spreadsheet or simple RBAC table in your ticketing system that lists required AD groups, SaaS groups, cloud roles (AWS/IAM, Azure RBAC), and required training modules; store the matrix in version control or your compliance repository and link it to the HR offer workflow.

Day-one provisioning and secure onboarding steps

Day-one tasks must be automated where possible and auditable: create an onboarding ticket template that triggers account creation, device image provisioning, MFA enrollment, and policy training. Example automations: 1) Provision an Azure AD account and force MFA enrollment on first sign-in, 2) Use a provisioning script to create an AWS IAM user and add to predefined groups. Concrete commands: for Active Directory PowerShell, run New-ADUser plus Add-ADGroupMember; for AWS use aws iam create-user --user-name Joe and aws iam add-user-to-group --user-name Joe --group-name Developers. Ensure the employee completes Acceptable Use and Data Handling training and that the signed acknowledgements are stored in the personnel file.

Ongoing access management and periodic reviews

Implement quarterly access reviews for all systems and an annual attestation for privileged roles. Automate reports from your identity providers: export group membership and role assignments from AD/AzureAD/AWS IAM and compare against the Role Access Matrix. For small businesses using Google Workspace, use the Admin SDK to list users and OAuth tokens; for AWS, run aws iam list-role-tags and aws iam list-attached-user-policies to generate evidence. Enforce least privilege by replacing long-lived access keys with short-lived credentials (AWS STS, Azure AD tokens) and use a secrets manager for shared credentials.

Offboarding: immediate, standard, and post-exit workflows

Offboarding must have an emergency (immediate termination) path and a standard resignation path. Immediate termination checklist: within 1 hour disable the user account(s), revoke active sessions, rotate shared passwords, and disable or reclaim company devices. Technical examples: in AD run Disable-ADAccount -Identity joesmith; in Azure AD Revoke-AzureADUserAllRefreshToken -ObjectId ; for AWS remove user access keys and delete login profile: aws iam delete-login-profile --user-name joesmith && aws iam list-access-keys --user-name joesmith then aws iam delete-access-key for each key. Standard offboarding (resignation): schedule device collection, transfer of knowledge, deprovision non-critical access within 24 hours and full revocation within 72 hours. Document each step in the HR ticket and attach screenshots or logs as evidence.</p>

Technical controls, logging and evidence collection

Maintain an auditable trail: enable directory logs (Windows Security Event Log, Azure AD sign-in logs, AWS CloudTrail, Google Workspace Admin logs) and retain them per policy (commonly 1–3 years depending on compliance obligations). Capture proof-of-action when provisioning/deprovisioning — e.g., ticket ID, command output, API response, and timestamps. Use SIEM or centralized log storage (ELK, Splunk, Azure Sentinel) to alert on anomalous activity such as account uses after a termination timestamp. For small businesses, even exporting CSV audit reports from Azure AD and storing them in a secure S3 bucket or encrypted SharePoint library with access controls can meet evidence requirements if retention and integrity are managed.

Risks of non-compliance and practical mitigation

Failure to implement Control 1-9-1 creates clear risks: ex-employees retaining access can lead to data theft, sabotage, regulatory fines, and loss of customer trust; inconsistent onboarding can lead to over-privileged accounts and accidental data exposure. Mitigate these risks by enforcing MFA, minimizing shared credentials, using automated deprovisioning scripts tied to HR status changes, and testing incident scenarios (tabletop exercises) quarterly. For a small business on a tight budget, prioritize MFA, an up-to-date asset inventory, and a single source of truth for user status (HRIS) that triggers IT actions via webhooks or simple automation like Power Automate or Zapier.

Summary

Meeting ECC – 2 : 2024 Control 1-9-1 is practical and achievable for small businesses when you codify onboarding/offboarding as auditable processes, automate routine actions, enforce least privilege and MFA, and retain logs and evidence. Build a Role Access Matrix, automate provisioning and revocation (include concrete AD/Azure/AWS commands in your runbooks), schedule periodic access reviews, and document every step within HR and IT tickets — doing so reduces insider risk, supports audits, and demonstrates compliance to stakeholders and regulators.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes