🚨 CMMC Phase One started November 10! Here's everything you need to know β†’

How to Test and Monitor Offboarding Controls to Prove CUI Protection: Compliance Checklist for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Step-by-step checklist to test and monitor offboarding controls required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PS.L2-3.9.2 to ensure CUI is protected during employee departures.

β€’
April 23, 2026
β€’
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Offboarding is one of the highest-risk moments for Controlled Unclassified Information (CUI): returning devices, revoking accounts and keys, and removing access across systems must be provable, repeatable, and auditable to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requirement PS.L2-3.9.2. This post gives a practical compliance-focused checklist for testing and continuously monitoring offboarding controls, with implementation notes, test procedures, monitoring metrics, and small-business examples to help you demonstrate CUI protection during personnel departures.

What PS.L2-3.9.2 Requires (Practical interpretation)

At its core, PS.L2-3.9.2 requires organizations to ensure that access to CUI is removed or adjusted promptly when personnel change duties, are terminated, or otherwise leave the organization. For compliance teams this means documented offboarding procedures mapped in your System Security Plan (SSP), an owner for the offboarding process, technical controls (IAM, DLP, endpoint management) that enforce the process, and evidence to show controls worked as intended. Implementation in a Compliance Framework context also requires that these processes are testable and monitored over time so assessors can verify continuous protection of CUI.

Testing Offboarding Controls: Practical Steps

Build tests around the end-to-end offboarding workflow: HR trigger β†’ ticket creation β†’ IAM deprovisioning β†’ device collection/wipe β†’ cloud credential revocation β†’ log capture. Example test cases: sample five recent separations and verify (1) HR separation timestamp, (2) offboarding ticket creation and owner assignment, (3) IAM account disabled/removed and time delta between HR trigger and account change, (4) device wipe or return record, (5) removal of access to cloud resources (AWS, Azure, G-Suite/M365, Git repositories), and (6) DLP/backup/hybrid archives handling for retained CUI. For each case collect screenshots, system logs, ticket timestamps, and hashes of wiped devices (where applicable) as evidence.

Technical checks and sample commands

Use platform APIs and CLI tools for reproducible evidence collection. Examples: AWS β€” list and deactivate access keys with aws iam list-access-keys and aws iam update-access-key --access-key-id --status Inactive; Azure AD/Microsoft Entra β€” query user status via Microsoft Graph (GET /users/{id}) and review signInActivity; Okta β€” check user status via GET /api/v1/users/{id}; GitHub/GitLab β€” remove deploy keys and OAuth app tokens. Automate these queries into a script that produces a timestamped JSON evidence bundle. For endpoints, use your MDM solution (Intune, Jamf, or similar) to show wipe commands and success acknowledgements (MDM job IDs, timestamps).</p>

Monitoring and Metrics to Prove Continuous Compliance

Continuous monitoring complements periodic tests. Implement a few KPIs to show your control is effective: mean time to deprovision (target e.g., <24 hours for terminations), percent of accounts disabled within SLA, number of accounts with remaining cloud keys after 7 days, and exceptions logged to the POA&M. Feed IAM events, HR events, and MDM actions into a SIEM or log aggregator and create dashboards/alerts: e.g., alert if account still active 24 hours after a termination event, or if a departing user has active API keys. Configure retention so evidence for assessments is available for the required audit window.

Test procedures and evidence collection

Create a repeatable test script and evidence checklist for assessors: 1) select a statistically relevant sample of offboards (e.g., last 10% or last 6 months), 2) pull HR separation records, 3) pull IAM audit logs showing disable/delete actions, 4) pull MDM wipe confirmations and asset inventory entries, 5) pull cloud provider logs demonstrating credential revocation, and 6) archive tickets and emails showing approvals. Package these artifacts in an evidence binder (electronic) and index them in the SSP with cross-references to PS.L2-3.9.2. Maintain a signed attestation from HR and IT for each sampled event where possible.

Real-world Small Business Scenarios

Scenario A β€” 30-person subcontractor using Okta, G-Suite, and AWS: implement an HRβ†’Okta workflow where HR’s offboarding form posts to a ticketing system (Zendesk/Jira Service Management). A scheduled script queries ticket status and uses Okta API to deactivate the user, then calls AWS CLI to list and delete access keys. Evidence: ticket ID, Okta deactivation timestamp, AWS key deletion logs, and MDM wipe job ID. Scenario B β€” small engineering firm with limited staff and no SIEM: use lightweight automation (Zapier/Power Automate) to capture HR offboarding events, generate a PDF evidence pack, and store it in an encrypted evidence repository (e.g., SharePoint with retention) β€” this is acceptable if logged, auditable, and repeatable.

Compliance Tips and Best Practices

Best practices include integrating HR and IAM so offboarding is triggered automatically; enforcing short SLA windows for deprovisioning; using role-based access control (RBAC) and least privilege so access scope is minimized before departure; rotating shared credentials immediately after offboarding; documenting exceptions (legal holds, retained access for knowledge transfer) and approving them via change control; and running quarterly access reviews to catch missed accounts. Maintain mapping in your SSP to PS.L2-3.9.2 and record your test schedule and results as part of your Compliance Framework artifacts (evidence for assessors and internal auditors).

Risk of not implementing these controls is high: lingering accounts, unused API keys, or unreturned devices provide attackers with an easy path to CUI. Beyond data loss, failures in offboarding controls can trigger contractual penalties, failed CMMC assessments, and loss of business eligibility for DoD contracts. Timely, documented deprovisioning and continuous monitoring dramatically reduce these risks and provide the auditors the proof they need.

Summary β€” a compliance-ready offboarding program for PS.L2-3.9.2 combines documented procedures, automated technical enforcement, repeatable test plans, and continuous monitoring. For small businesses the path to compliance is pragmatic: automate what you can, capture auditable evidence for what you do manually, measure SLAs, and keep everything mapped in the SSP so assessors can verify that CUI is protected when personnel leave or change roles.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 ECC Compliance App

ECC Compliance

Become compliant, provide compliance services, or verify partner compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) requirements.
 
Hello! How can we help today? πŸ˜ƒ

Chat with Lakeridge

We typically reply within minutes