🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Offboarding Checklist to Protect CUI During Terminations and Transfers — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Step-by-step guidance to build an offboarding checklist that preserves Controlled Unclassified Information (CUI) and meets NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.2 requirements.

March 29, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

When a user leaves your organization or moves to a new role, unmanaged access to systems and data — especially Controlled Unclassified Information (CUI) — creates a major compliance and business risk; building a disciplined, repeatable offboarding checklist aligned to NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (PS.L2-3.9.2) ensures access is removed, assets are returned, and auditable records are created.

Why PS.L2-3.9.2 matters for small businesses handling CUI

PS.L2-3.9.2 (Personnel Security — termination and transfer controls) requires organizations to terminate or adjust access privileges promptly when employment ends or duties change. For small defense contractors and vendors with limited staff and tight budgets, a formal offboarding process removes guesswork and prevents former employees, contractors, or transferees from retaining access to CUI via accounts, shared passwords, cloud file shares, or hardware tokens.

Step-by-step offboarding checklist (actionable items)

Design the checklist as a ticket-driven workflow (HR ticket triggers IT/Security tasks). At minimum include the following actionable items — each task should capture owner, timestamp, and evidence (screenshots or log IDs):

  • HR: Confirm termination/transfer date, return of company property deadline, and assign a custody owner for physical CUI.
  • Identity: Immediately disable/lock the user account at the announced termination moment; for transfers, start privilege review and adjust group memberships before the role change.
  • MFA and SSO: Revoke MFA tokens, invalidate SSO sessions, and remove device registrations in Azure AD/Okta/G Suite.
  • Credentials & secrets: Rotate shared passwords in vaults (1Password, LastPass, CyberArk, HashiCorp Vault), rotate API keys, and revoke OAuth tokens.
  • Endpoints & mobile: Collect laptops/phones; or trigger remote wipe via MDM (Jamf, Intune) and confirm BitLocker/cryptographic key escrow.
  • Cloud resources: Remove from SharePoint/Google Drive groups, revoke IAM roles (AWS/GCP/Azure), remove access to repositories (GitHub), and rotate any service-account credentials they could influence.
  • Physical access: Disable badge access, update facility access lists, and record badge deactivation log.
  • Privileged accounts: Reassign or rotate credentials for privileged accounts they administered (local admin, service accounts, network appliances), and update documented break-glass procedures.
  • Email: Disable auto-forwarding rules, remove mailbox delegates, and archive mailbox per policy.
  • Legal & data custody: Inventory CUI the person accessed, collect signed attestation of CUI return/destruction, and create a chain-of-custody record for any physical media.
  • Logs & audit: Export and preserve relevant logs (VPN, EDR, cloud access) for a retention window aligned with incident response policy.

Immediate termination vs. planned transfers

For involuntary or high-risk terminations, enforce "day-zero" actions: immediate account disablement, badge deactivation, device lockdown, and evidence capture. For planned transfers, schedule phased actions: change access on the effective date, ensure overlap for knowledge transfer, and conduct an access-review sign-off before role change. Document the timing rules in the checklist and automate enforcement where possible.

Technical implementation details and automation

Integrate the offboarding checklist with HRIS and ITSM (e.g., Workday → ServiceNow → Azure AD). Automate the most error-prone tasks: scripted user disablement in Active Directory/Azure AD, API calls to revoke tokens and rotate service keys (AWS IAM: disable/rotate access keys; GitHub: remove SSH keys; Vault: revoke leases), and MDM commands for device wipe. Use EDR (CrowdStrike, SentinelOne) to isolate endpoints immediately and pull endpoint telemetry for forensic hold. Log automation actions to a central SIEM (Splunk/ELK/Microsoft Sentinel) to provide tamper-evident audit trails that satisfy CMMC audit expectations.

Small business scenario: 25-person subcontractor

Example: ACME Defense Solutions (25 staff) stores CUI in SharePoint and local CUI repositories, uses Azure AD + Intune, and a shared password vault. When a systems engineer is terminated, HR triggers an offboarding ticket. Within five minutes, Azure AD is set to disabled via an automated script, the password vault entry the engineer had access to is rotated, Intune sends a wipe for the company phone, and the security admin archives VPN/EDR logs to the secure evidence folder. Having these steps automated reduced risk and ensured ACME met subcontractor audit requests within 48 hours without hiring external consultants.

Compliance tips and best practices

Practical tips: 1) Maintain a documented owner for each checklist item (HR, IT, Security, Facilities); 2) Use a least-privilege model to minimize how many privileges need to be revoked; 3) Keep an up-to-date inventory of CUI locations (SharePoint sites, S3 buckets, local file shares); 4) Conduct quarterly access reviews and reconcile with offboarding tickets; 5) Test termination and transfer processes via tabletop exercises and simulated terminations. Also, retain evidence artifacts (screenshots, logs, ticket closure notes) for at least the retention period required by NIST/CMMC policies.

Risks of not implementing an effective offboarding checklist

Failing to reliably remove access increases the chance of CUI exfiltration, insider threats, or accidental exposure: a transferred employee could keep access to a legacy SharePoint folder and inadvertently share CUI externally; a terminated contractor might retain VPN credentials and access internal assets; unrotated service credentials create persistent backdoors. Noncompliance consequences include losing DoD contracts, remediation orders, financial penalties, and reputational damage — outcomes that can be terminal for small businesses in the defense supply chain.

Summary: A NIST/CMMC-compliant offboarding checklist is both procedural and technical — it should be ticket-driven, integrate HR/IT/security systems, automate immediate actions for high-risk terminations, and capture auditable evidence. For small organizations, prioritize automation for time-sensitive steps (account disable, MFA revoke, device wipe), maintain an accurate CUI inventory, and test the process regularly; doing so reduces exposure, supports audits, and helps demonstrate compliance with PS.L2-3.9.2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes