🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Test and Validate Offboarding Controls with Tabletop Exercises — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Learn how to design and run tabletop exercises to test offboarding controls required by NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 (PS.L2-3.9.2), with practical steps, technical checks, and small-business examples.

•
April 23, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Offboarding is one of the highest-risk lifecycles in an organization: failing to remove access, revoke credentials, and recover assets creates immediate exposure for sensitive data and systems. NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 call for effective personnel security and access termination controls (PS.L2-3.9.2); tabletop exercises are a low-cost, high-value way to test whether those controls work in practice. This post walks through how a small business can design, run, and validate offboarding controls using realistic tabletop scenarios, technical checks, and measurable success criteria aligned to the Compliance Framework.

Why run tabletop exercises for offboarding

Tabletop exercises let you simulate an offboarding event end-to-end without impacting production systems. They force cross-functional teams (HR, IT, Security, Legal, and relevant business owners) to execute their parts of the process in sequence, reveal gaps in automation, ticketing and logging, and produce evidence auditors want to see. For small businesses with lean teams, tabletop exercises demonstrate that policies are not just written but operationalized under time pressure and unexpected conditions.

Key objectives and measurable outcomes

Design your tabletop with clear objectives: verify access revocation within SLA (e.g., 1 hour for terminated employees), ensure device recovery and remote wipe actions, confirm privileged account handling, validate third-party contract terminations, and produce audit evidence (ticket IDs, log extracts, device wipe receipts). Measurable outcomes include Mean Time To Revoke (MTTR) access, percent of offboards completed with a documented checklist, and successful removal of active credentials (SSO sessions, API keys, SSH keys, cloud access). Align these metrics to PS.L2-3.9.2 evidence requirements.

Practical implementation: building the tabletop

Start by scoping: pick 2–4 representative scenarios that reflect real risk to a small business (e.g., terminated disgruntled employee with VPN access, end-of-contract contractor with cloud keys, privileged admin changing roles). Prepare injects that add complexity: late-night termination, employee working from personal device, stale service account, or manager forgetting to return company laptop. Assemble stakeholders: HR lead, IT admin, Security engineer, Helpdesk, and the business owner who signs off on access lists. Use a facilitator and a scribe to capture decisions, timestamps, and artifacts.

Include technical checkpoint tasks in each scenario. Example technical checks for offboarding validation: run Active Directory/LDAP queries and show account disabled (PowerShell: Disable-ADAccount -Identity "jsmith"); confirm Azure AD refresh token revocation via the appropriate Graph API or PowerShell command; delete or deactivate AWS IAM access keys (aws iam delete-access-key --user-name jsmith --access-key-id AKIA...); remove user SSH keys from servers and Git repositories; unenroll devices from MDM (Intune/Workspace One) and record remote-wipe receipts; remove user from PAM systems (CyberArk/BeyondTrust) and rotate shared credentials. Prepare sample logs or access feeds (VPN logs, SSO logs, cloud console logs) to validate that access was cut and no further sessions are active.

Real-world small business scenarios

Scenario A — Disgruntled employee terminated after-hours: HR issues termination email at 02:00. Tabletop checks: confirm automation or on-call process disables Active Directory account within target SLA; revoke VPN sessions and SSO refresh tokens; remove device from MDM and initiate selective wipe if company data is present. Scenario B — Contractor with API keys: validate that a contract-end workflow triggers deletion of cloud keys, revocation of OAuth tokens, and removal from project repositories. Scenario C — Privileged admin changes role: ensure that role-based access is updated, privileged sessions are terminated, and PAM entries are rotated. For each, capture ticket numbers, timestamps, command output, and log snippets as compliance evidence.

Execution, evidence collection, and audit readiness

During the tabletop, demand artifacts: ticket IDs created/closed in ServiceNow or Jira, screenshots or export of AD/Azure queries, cloud console audit logs, MDM unenrollment receipts, and PAM change records. Use a simple evidence spreadsheet mapping each control objective to proof items (e.g., "Access revoked" -> AD disabled, VPN session terminated, cloud API key deleted). If automation is used (SCIM provisioning, Identity Governance, or Workflows), include runbook outputs and webhook logs that show automatic deprovisioning executed successfully.

Measure and iterate: after the table-top, produce an after-action report with findings, root causes, and an explicit remediation plan for each gap (e.g., implement SSO token revocation API call in offboarding playbook, add a nightly job to detect orphaned cloud keys, or expand HR/IT on-call overlap). Track remediation in your project management tool with owners and deadlines. Repeat exercises semi-annually or after major staff changes, and include at least one surprise inject per year to test responsiveness.

Risks of not testing or improperly implementing offboarding controls are concrete: retained access can lead to data exfiltration, unauthorized code commits, supply-chain compromise, and failed audits that jeopardize contracts with regulated customers. For small businesses, a single ex-employee’s lingering cloud key or unrevoked admin session can lead to breach incidents that are costlier than implementing the relatively small number of automation scripts, policy changes, and training you need to fix gaps.

In summary, tabletop exercises are an affordable, practical method to validate PS.L2-3.9.2 offboarding requirements under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2. Build scenarios that reflect your environment, include precise technical checks (AD/Azure/Okta, MDM, IAM, PAM, SSH keys), collect concrete evidence, track measurable metrics like MTTR for access revocation, and convert findings into time-bound remediation actions. For small businesses, this approach both reduces real-world risk and generates the audit artifacts needed to demonstrate compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes