🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Practical Offboarding Checklist to Protect CUI During Transfers and Terminations — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Practical step-by-step guidance to build an offboarding checklist that ensures CUI is protected during employee transfers and terminations to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirements.

April 09, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 control 3.9.2 (mapped to CMMC 2.0 Level 2 PS.L2-3.9.2) requires organizations to ensure personnel take actions to protect Controlled Unclassified Information (CUI) when employees transfer or leave the organization; building a practical offboarding checklist is the single most effective control small businesses can operationalize to prevent data exposure during these events.

Implementation overview and key objectives

The primary objectives are immediate removal or curtailment of access to CUI, secure collection or transfer of devices and credentials, documented handoff of any CUI owned or processed by the employee, and retention of evidence that actions were taken. For a Compliance Framework implementation this means tying HR triggers to IT/Security workflows, documenting required steps, assigning SLAs (for example: terminate active logical access within 1 hour for involuntary terminations, within 24 hours for scheduled transfers), and logging each action in an auditable ticketing system.

Offboarding checklist — core process items (practical, compliance-focused)

A useful checklist should be actionable and short enough to execute reliably. At minimum include: HR initiation (termination/transfer date, manager confirmation), immediate account actions (disable login, revoke tokens, block SSO), asset recovery (laptop, phone, tokens, USBs), data handoff (identify CUI locations and transfer/retain per policy), device wipe or reimage, credential rotation for shared accounts, physical access termination (badge/keys), and evidence capture (ticket IDs, screenshots, signed receipts). Automate item creation from HR systems where possible (SCIM/SSO) and require IT and Security sign-off.

Technical implementation details and sample commands

Implement automation and specific commands for your environment to reduce human error. Examples: in Active Directory/Entra ID use PowerShell to disable accounts: Disable-ADAccount -Identity "jsmith"; for Azure AD revoke refresh tokens: Revoke-AzureADUserAllRefreshToken -ObjectId <userObjectId>; in AWS deactivate IAM keys: aws iam update-access-key --user-name jsmith --access-key-id AKIA... --status Inactive. For Linux hosts remove SSH keys (sed -i '/ssh-rsa.*jsmith/d' ~/.ssh/authorized_keys) and remove sudo privileges from /etc/sudoers. Use Intune/MDM to issue a remote wipe for mobile devices and BitLocker/FileVault keys to ensure recovered devices are encrypted. For SSO providers (Okta/Google Workspace) call the revoke-sessions API to end active sessions and remove group memberships via SCIM to immediately cut application access.

Real-world small-business scenarios

Scenario A — Involuntary termination at a 50-employee defense subcontractor: HR flags termination in the HRIS, which triggers an automated ticket to IT. Within 30 minutes IT disables Azure AD sign-in, revokes Okta sessions, deactivates VPN and AWS keys, and schedules asset pickup. Security rotates shared AWS keys used by the terminated employee and runs a quick SIEM query for suspicious exfiltration attempts. The evidence (ticket updates, screenshots, SIEM logs) is zipped and stored for audit.

Scenario B — Internal transfer from engineering to sales: the employee retains employment but no longer needs CUI access. The checklist requires removal from engineering AD/SharePoint groups, revocation of privileged roles (e.g., access to code repos containing CUI), and a documented handover of any CUI artifacts. Access rights are reduced using a role-based permission change rather than full termination where appropriate. If the employee will still handle CUI in the new role, update their access and provide a new access justification record.

Compliance tips and best practices

Automate deprovisioning with SSO + SCIM where possible to achieve near-instant revocation. Maintain an asset inventory with serial numbers and encryption status so IT can prioritize collection and verify disk encryption before wipe. Implement time-based access reviews and least privilege to reduce the blast radius. Keep a short, signed offboarding acknowledgement that the employee returned assets and disclosed locations of personal or shared CUI copies. Retain offboarding artifacts (tickets, logs, signed receipts) for the retention period required by your contract or policy—these are critical evidence for auditors.

Risk of not implementing this control

Failing to execute a practical offboarding checklist exposes CUI to both accidental and malicious risks: ex-employees with lingering access can copy files, maintain VPN connections, or use saved credentials to access cloud-hosted CUI. Small businesses face heightened risk because staff often have broad access and fewer compensating controls. Consequences include contract penalties, reputational damage, data breaches, and potential loss of ability to hold DoD contracts. Even a single missing step—like not rotating a service account password—can create a persistent vulnerability.

Operational roles, SLAs, and evidence collection

Define clear responsibilities: HR triggers, IT executes access revocation and asset collection, Security performs validation and audit queries, and the hiring manager confirms CUI handoff. Establish SLAs: immediate for disabling logical access on involuntary termination, 24 hours for scheduled departures, 72 hours for full asset recovery for small businesses with limited staff. Capture evidence in your ticketing system and store immutable logs (SIEM exports, MFA challenge logs) in a secure archive. Periodically test the offboarding process with mock terminations and review any gaps uncovered.

In summary, meeting NIST SP 800-171 Rev.2 / CMMC 2.0 PS.L2-3.9.2 is practical for small businesses when you translate the control into a compact, automated offboarding checklist that ties HR events to immediate technical actions, asset recovery, credential rotation, and auditable evidence collection; doing so reduces the risk of CUI exposure while creating defensible proof of compliance for audits and contract requirements.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes