Terminating access to systems that store, process, or transmit Controlled Unclassified Information (CUI) is one of the highest-risk events for small businesses handling federal data — and PS.L2-3.9.2 in NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires a repeatable, documented approach to ensure those accesses are removed quickly and completely. This post gives a practical termination playbook and an implementation checklist with technical examples, compliance evidence ideas, and small-business scenarios you can adopt immediately.
What PS.L2-3.9.2 Requires (Key Objectives)
The control requires that organizations have defined procedures to terminate access to organizational systems and CUI when employees, contractors, or other personnel are transferred, terminated, or no longer require access. Key objectives are: (1) promptly remove logical and physical access; (2) preserve evidence for audits; (3) ensure CUI remains protected after separation; and (4) maintain documented roles and escalation paths. Your playbook must be measurable, repeatable, and demonstrable to an assessor.
Termination Playbook — Implementation Checklist
Build your playbook as a structured checklist that maps HR triggers to technical actions and evidence collection. Core items: (a) triggers and timing (resignation, termination for cause, contract end, role change); (b) responsible parties (HR, IT, security, facilities, managers); (c) scope (accounts, keys, devices, physical badges); (d) timelines (immediate for high-risk, within 24 hours for routine separations); (e) audit artifacts (ticket ID, timestamps, screenshots, logs); and (f) post-termination actions (asset return, exit interview, data preservation). Document each step with the owner and SLAs.
Procedural Steps (high-level)
Create a workflow that starts with an HR event feed (HRIS, Payroll, or ticket). Example sequence: HR raises an offboarding ticket → Manager confirms CUI access list → IT receives automated webhook → Identity provider deprovisions account → MDM wipes device and EDR isolates endpoints → Facilities revokes badge → Security archives logs. For small businesses, integrate simple automation: use Zapier/Workato or an HRIS webhook to create a ticket in Jira/ServiceNow/Zoho with the required checklist items.
Technical Implementation Details
Technical actions must cover identity, endpoints, cloud, secrets, and network access. Examples: disable Active Directory/Azure AD account via PowerShell, revoke Okta user sessions and tokens via API, remove AWS IAM user keys and detach policies using aws-cli, rotate Vault secrets and revoke tokens, change shared passwords in your enterprise password manager, revoke VPN certificates, and perform an MDM remote wipe (Intune, Jamf). Example commands (illustrative):
# Disable Azure AD user (PowerShell)
Disable-AzureADUser -ObjectId user@company.com
# Revoke AWS access keys
aws iam update-access-key --access-key-id AKIA... --status Inactive --user-name departing-user
Also ensure EDR (CrowdStrike/Carbon Black) isolates the endpoint and that backups containing CUI are tagged and retained but not accessible to the departed user. Maintain scripts in a secured runbook repository and require MFA and privileged approval to execute.
Small-Business Scenarios and Practical Examples
Scenario A — Remote contractor completes a contract: HR marks contractor as completed in the HRIS. A webhook creates a ticket; IT uses the IdP (e.g., Okta) to revoke sessions and deprovision the account within 1 hour; MDM unenrolls the contractor device and EDR confirms no active sessions. Scenario B — Employee terminated for cause: immediate IT lockout, reset service account credentials that the user had access to, revoke SSH keys associated with the user on internal servers, rotate shared secrets in HashiCorp Vault, and perform a forensic snapshot of the user workstation for investigators. For constrained budgets, small businesses should rely on SaaS tools with built-in connectors (Okta + Intune + CrowdStrike) to automate most of these steps.
Compliance Evidence, Documentation, and Audit Readiness
Auditors will want evidence that the procedures were followed. Maintain: (1) ticket history showing timestamps and owners; (2) IdP logs showing disabled accounts and token revocations; (3) MDM/EDR logs showing wipes and isolates; (4) cloud provider logs showing IAM key deactivation; (5) screenshots of password manager changes; and (6) a signed offboarding checklist (HR + manager). Retain these artifacts according to your contracts and NIST/CMMC evidence expectations — typically a minimum of 12 months, but follow contract-specific retention. Include a summary report for each termination event in a secure evidence repository.
Risks of Not Implementing the Playbook
Failure to promptly remove access exposes CUI to unauthorized disclosure, lateral movement, credential abuse, and supply-chain compromise. Real consequences include data breaches, contract termination, loss of DIBCAC/CMMC certification, financial penalties, and reputational damage. Insider threats are common: a single retained VPN credential or SSH key can allow exfiltration of CUI long after separation. For small businesses, one breach can sink a contractor relationship with a prime or government customer.
Best Practices and Testing
Best practices: enforce least privilege and role-based access control; centralize identity and secrets; use privileged access management for admins; require MFA for all access; rotate shared secrets on user deprovision; and build automation so manual tasks are minimized. Regularly test your playbook with tabletop exercises and at least annual live drills that simulate different termination types (voluntary, involuntary, contractor end). Update SLAs and playbook steps based on lessons learned and log the drill results as evidence of continuous improvement.
Summary: For NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.2 compliance, create a documented termination playbook that ties HR events to automated technical actions, defines roles and SLAs, captures audit artifacts, and is exercised regularly. Small businesses can achieve strong protection for CUI by using identity-first automation (IdP + MDM + EDR), encrypting and tagging CUI, and keeping an evidence trail for every deprovisioning event — reducing risk and demonstrating compliance to assessors.