🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to build an HR-IT integrated termination checklist to comply with Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-5

Step-by-step guidance for building an HR–IT integrated offboarding checklist that meets ECC – 2 : 2024 Control 1-9-5, with automation tips, technical commands, and small-business examples.

March 29, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Effective offboarding is a compliance control as much as it is an operational task — ECC – 2 : 2024 Control 1-9-5 requires synchronised HR and IT processes that ensure former employees lose access to systems and data promptly, consistently, and with an auditable trail; this post walks through building a practical HR‑IT integrated termination checklist for organisations operating under the Compliance Framework, with technical examples, timelines, automation ideas, and small-business scenarios.

Key objectives

The primary objectives of an HR‑IT integrated termination checklist under the Compliance Framework are: ensure immediate revocation of all logical and physical access upon separation; preserve evidence for legal or regulatory holds; maintain an auditable, timestamped trail of actions; and reduce the risk window for credential misuse or data exfiltration. Practically this means defining roles (HR, IT, Security, Legal), SLA targets (e.g., initial access disable within 1 hour of notification), and exception handling (legal holds, vendors, contractors).

Implementation notes — process, roles and SLAs

Start with a triggered workflow: HR marks the employee as terminated in the HRIS -> HR triggers an offboarding ticket in the ITSM system (or the HRIS issues a webhook) -> IT executes the checklist -> Security monitors for anomalous activity and closes the ticket only after evidence collection and device return. Assign clear owners for each step: HR owns notification and documentation, IT owns access revocation and asset collection, Security owns monitoring and forensic preservation, and Legal owns holds and retention exceptions. Set measurable SLAs: disable account and revoke active sessions within 60 minutes for privileged roles, 4 hours for regular accounts; initiate device-recovery within 24–72 hours; complete physical asset inventory adjustment within 5 business days.

Technical implementation details

Translate checklist items into executable technical steps and, where possible, automate them. Examples of concrete actions: disable Active Directory accounts (PowerShell: Set-ADUser -Identity "jdoe" -Enabled $false or Disable-ADAccount -Identity "jdoe"), suspend Google Workspace users (via Admin Console or GAM: gam update user jdoe suspended on), deactivate AWS credentials (list-access-keys then aws iam update-access-key --access-key-id --status Inactive --user-name jdoe), revoke OAuth tokens and session cookies by forcing password reset or revoking refresh tokens, and initiate an Intune / Endpoint Manager remote wipe for corporate mobile devices (via Graph API POST /deviceManagement/managedDevices/{id}/wipe). Also rotate passwords for shared/admin accounts that the user had access to and check mailbox forwarding rules and third-party SaaS integrations (use SCIM/Okta/Azure AD APIs where available to deactivate users centrally).</p>

Automation, logging and auditability

Automate the ticket lifecycle and the initial access disable step to reduce delays and human error: tie HRIS status to the identity provider via SCIM or a webhook integration to create and assign an offboarding ticket automatically. Use your SIEM to tag and retain offboarding events, and configure the IAM and MDM systems to emit audit logs that persist for your retention period. Implement an offboarding runbook in your ITSM (JIRA, ServiceNow, Freshservice) with checklist items that require explicit owner signoff and an attached artifact (screenshot, command output, API response). Maintain an immutable record (or exportable PDF) of the offboarding ticket for compliance review and audits.

Real-world small-business scenarios

Scenario A — part-time remote contractor: HR marks contractor termination; the webhook suspends contractor account immediately; IT revokes API keys linked to contractor projects, removes the user from GitHub/Bitbucket teams, and rotates any shared repository deploy keys. Scenario B — disgruntled employee with privileged access: HR sends an emergency termination flag; IT disables AD account within 15 minutes, forces token revocations, blocks VPN access, and Security isolates their device via EDR (e.g., isolate device in CrowdStrike/Microsoft Defender). Scenario C — outsourced salesperson: terminate CRM and file-share access, remove shared drive permissions, and reassign customer accounts to a new owner to avoid service disruption. For small businesses with limited headcount, pair automation (SCIM, IAM connectors) with a simple explicit checklist to avoid reliance on memory.

Risks of not implementing and compliance best practices

Failing to implement this control exposes the business to data theft, lateral movement, compliance violations, fines, and reputational harm. Orphaned accounts allow attackers to persist, ex-employees can retain access to customer data or proprietary information, and auditors will flag lack of evidence for timely deprovisioning. Best practices: enforce least privilege and role-based access so offboarding scope is limited; perform quarterly access reviews to catch stale entitlements; test the offboarding process with tabletop exercises; keep an exception register for legal/retention holds and document why access remains; and implement retention of offboarding logs for the period required by your Compliance Framework and regulators.

Conclusion

To comply with ECC – 2 : 2024 Control 1-9-5 under the Compliance Framework, build an HR‑IT integrated termination checklist that combines clear ownership, tight SLAs, technical playbooks, automation for speed, and auditable logs; for small businesses this means prioritising identity connectors (SCIM), ticket automation, and a compact, enforced checklist that covers account disablement, token revocation, device recovery, shared-account rotation, and legal holds — implement, test, and iterate to reduce risk and provide demonstrable evidence of compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes