🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build an Onboarding & Offboarding Process to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-2

Practical, step-by-step guidance to design automated and auditable onboarding and offboarding processes that satisfy ECC – 2 : 2024 Control 1-9-2 for small and growing organizations.

April 15, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Onboarding and offboarding are not just HR chores — they are foundational cybersecurity controls that reduce insider risk, prevent unauthorized access, and produce audit evidence required by Compliance Framework ECC – 2 : 2024 Control 1-9-2; this post explains how to design, implement, and evidence a practical identity lifecycle process for small businesses.

Understanding ECC – 2 : 2024 Control 1-9-2 within Compliance Framework

Control 1-9-2 requires organizations to maintain a documented, repeatable process for granting, modifying, and revoking user access tied to employment or role changes, and to retain evidence that these activities occurred. Key objectives are: (1) ensure least-privilege access at all times; (2) promptly remove access on role change or termination; and (3) retain clear logs and evidence to demonstrate compliance to an auditor. For small businesses this means combining HR triggers, an identity provider (IdP), and simple automation or runbooks to reliably manage access.

Designing the Onboarding Process (Practical Implementation)

Start by defining role templates and the minimum set of accesses required for each role. Create an onboarding checklist that ties together HR, IT, managers, and asset provisioning. At a technical level, integrate your HRIS (e.g., BambooHR, Workday) with your IdP (Okta, Azure AD, Google Workspace) using SCIM or HR webhooks so that a new hire row automatically creates an identity and assigns role-based groups. Enforce MFA at the IdP level and apply conditional access policies (e.g., require MFA for admin roles or for access from unrecognized networks). Provision devices from an image that contains endpoint protection and configuration management (MDM like Intune or Jamf), so asset configuration is consistent and auditable.

Designing the Offboarding Process (Practical Implementation)

Offboarding must be immediate, repeatable, and verifiable. Implement a two-step process: (A) suspension, then (B) cleanup and deletion after retention periods. When HR triggers a termination in the HRIS, the IdP should immediately suspend the account (disable login) and revoke active sessions and OAuth tokens via API. Then remove access to cloud consoles, SaaS apps, VPN, and shared credentials. For cloud users, use these validated AWS CLI operations as part of a cleanup script: aws iam delete-access-key --user-name alice --access-key-id AKIA..., aws iam delete-login-profile --user-name alice, and remove group memberships with aws iam remove-user-from-group. For SaaS systems, use the provider's API to revoke sessions and tokens (Okta, Google Workspace, Slack APIs all support session revocation). Capture each step as evidence (screenshots, API response logs, or audit trail entries) and store them in your compliance repository.

Specific Technical Controls to Implement

Key technical controls include: (1) SCIM or API-based provisioning/deprovisioning between HRIS and IdP; (2) System-enforced role-based access control (RBAC) groups managed by the IdP; (3) Multi-factor authentication enforcement for all users and stronger controls for privileged accounts; (4) Privileged Access Management (PAM) for shared or admin accounts; (5) automatic device wipe or MDM enrollment to reclaim company-managed endpoints; and (6) logging of all provisioning/deprovisioning events to a centralized SIEM or log store for retention and auditing.

Audit, Documentation, and Evidence Collection

To satisfy Compliance Framework evidence requirements, build logs and artifacts into the workflow. Examples of acceptable evidence: HR termination entry, IdP suspension event with timestamp and user ID, API responses showing token revocation, device wipe confirmation, and a signed checklist from the manager and IT. Schedule periodic access reviews (quarterly or semi-annually depending on risk) where managers attest to need for current accesses; generate and retain attestation reports. Maintain retention policies for these artifacts consistent with your compliance program (commonly 1–3 years depending on industry or internal policy).

Real-world Small Business Scenario

Example: a 25-person SaaS startup uses G Suite, AWS, and a single IdP (Okta). HR marks a developer as departing in BambooHR; a webhook notifies Okta, which suspends the account and removes group memberships. An automated script (triggered by the webhook) runs three AWS CLI commands to delete access keys and remove the user from IAM groups and calls the Google Admin SDK to revoke the user's OAuth tokens. IT receives a task to reclaim the company laptop; MDM initiates a remote wipe once the device is returned. All API responses and the HR record are stored in a secure S3 bucket with restricted access for auditors. This flow reduces manual steps while producing a clear audit trail.

Risks of Not Implementing the Requirement and Compliance Tips

Failure to implement reliable onboarding/offboarding increases risk of data exposure from orphaned accounts, insider exfiltration, and non-compliance findings during audits (fines, remediation orders, or lost contracts). Common pitfalls: relying on email requests to IT, inconsistent role definitions, failure to revoke API keys or SSH keys, and no proof of completion. Best practices: (1) automate the “trigger → suspend → revoke → evidence” path; (2) centrally manage shared accounts and replace passwords on role changes; (3) rotate and centrally manage SSH keys and certificates; (4) keep a documented SLA (e.g., immediate suspension within 15 minutes of HR notification); (5) maintain an emergency offboarding playbook for urgent terminations; and (6) run quarterly identity and access reviews with evidence of manager attestations.

In summary, meeting ECC – 2 : 2024 Control 1-9-2 is achievable for small businesses by codifying role definitions, integrating HR and IdP systems, automating critical deprovisioning steps, and building evidence capture into the workflow; doing so reduces security risk and provides the audit trail required by Compliance Framework while keeping operational burden manageable.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes