🚨 CMMC Phase One started November 10! Here's everything you need to know →

Step-by-Step Implementation Plan: From Hiring to Termination — Meeting Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-1 Requirements

A practical, step-by-step plan for small businesses to implement ECC-2:2024 Control 1-9-1 (user lifecycle from hiring to termination) including technical configurations, risk controls, and audit-ready evidence.

March 29, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a pragmatic, auditable implementation plan to meet Compliance Framework ECC‑2:2024 Control 1‑9‑1 — the user lifecycle control that requires consistent and secure handling of identity and access from hiring through termination, tailored for small businesses and practical for IT teams to implement right away.

Overview: What Control 1‑9‑1 Requires

Control 1‑9‑1 focuses on lifecycle management of identities: ensuring that accounts and entitlements are created according to approved roles, that ongoing changes (role changes, promotions, leaves) are applied promptly, and that accounts are revoked on termination or role change. Implementation must demonstrate documented procedures, technical enforcement (provisioning/deprovisioning), and evidence that actions occur within defined timeframes.

Step-by-step implementation plan (high level)

Break the project into five phases: (1) Policy & process design, (2) Integrate HR and IT workflows, (3) Technical provisioning and tooling, (4) Ongoing governance and monitoring, and (5) Offboarding and retention. Each phase should produce artifacts: a written policy, approved role templates, a provisioning playbook, automation scripts or connectors, and an audit log retention policy. For small teams, these artifacts can be intentionally lightweight yet evidence-based.

Phase 1 — Policies, Role Definitions, and Hiring Controls

Create a concise Access Policy that maps business roles (sales, engineering, finance) to minimum privileges (role-based access control). Define SLAs for onboarding (e.g., account created within 1 business day of start) and offboarding (access revoked within 1 hour of termination notification). Practical tip: maintain a simple CSV or a shared Google Sheet with canonical role templates, required SaaS access, and device entitlements to avoid ad-hoc access requests. Include HR checks (background verification) and contract clauses requiring return of devices and protection of data — these are required evidence items under the Compliance Framework.

Phase 2 — Integrate HR and IT: Automate Provisioning

Implement an HR→IT workflow so HR triggers technical actions. For small businesses, use an identity provider (IdP) that supports SCIM (Okta, Azure AD, Google Workspace) to automate account creation and group membership. Example: when HR marks "start" in the HR system, trigger SCIM to create the account and add the user to groups for their role. Technical detail: configure SCIM with role-to-group mappings and test account lifecycle via the IdP sandbox. If using on-prem Active Directory, use PowerShell scripts tied to an HR ticketing webhook: New-ADUser -Name "Jane Doe" -SamAccountName jdoe; Add-ADGroupMember "Sales" -Members jdoe; then enable mailbox provisioning via Exchange scripts. Log the HR timestamp and the provisioning timestamp to demonstrate SLA compliance.

Phase 3 — Ongoing Controls: MFA, PAM, and Access Reviews

Enforce Multi-Factor Authentication for all interactive access, and deploy a Privileged Access Management (PAM) approach for admin accounts (time-limited elevation via Just-In-Time or jump hosts). For small businesses without enterprise PAM, mitigate risk by requiring an elevated-role approval ticket and temporary credentials that expire. Schedule quarterly access reviews: generate a report from the IdP listing active users, group memberships, and last login. Track metrics: percentage of users with MFA enabled, time-to-provision average, and stale accounts older than 90 days. Technical detail: enable conditional access policies to require device compliance (Intune/Workspace) and block legacy authentication where possible.

Phase 4 — Termination & Offboarding Procedures

Define an immediate offboarding checklist: disable account, revoke SSO sessions, revoke API keys and cloud access keys, change shared credentials, collect company devices, and preserve mailbox/data for investigations and legal holds. For technical actions, use API calls or CLI for fast execution (example: Okta deactivate-user API or: az ad user update --id user@contoso.com --accountEnabled false for Azure AD). Ensure cloud providers follow suit — deactivate AWS IAM access keys (aws iam update-access-key --user-name bob --access-key-id AKIA... --status Inactive) and remove SSH keys from hosts. Document timestamps of each step and the identity of the responder for audit evidence.

Real-world small-business scenario

Example: A 30-employee SaaS startup uses Google Workspace, GitHub, and AWS. Implementation: (1) HR creates a hire ticket in a shared Slack channel; (2) an automation (Zapier or a small serverless function) posts the hire to an IdP with SCIM to add the employee to Google Workspace and a "engineer" GitHub org team; (3) conditional access requires MFA and device management; (4) on termination, HR sets status to "terminated" which triggers the IdP to suspend the account, revoke OAuth tokens, remove GitHub team membership, and rotate shared CI/CD secrets. This flow minimizes manual steps and produces timestamped logs for Compliance Framework auditors.

Compliance tips, best practices, and risk of non-implementation

Best practices: maintain an up-to-date inventory of privileged accounts, apply the principle of least privilege, document every role change in your HR system, require signed acknowledgement of security policies at hire, and store offboarding artifacts (deprovisioning logs, device receipts) in a secure evidence repository. Risk if not implemented: lingering credentials can be exploited by former employees or attackers, leading to data exfiltration, ransomware, regulatory fines, and reputational damage. Auditors will flag long delays between termination and access removal, missing logs, and absence of documented procedures — all of which can be remediated with the steps above.

Summary: By adopting a phased approach — policy + role templates, HR‑IT automation, strong authentication and PAM, disciplined offboarding, and continuous audits — small businesses can meet ECC‑2:2024 Control 1‑9‑1 efficiently. Start by building simple automated connectors (SCIM or scripts), enforce MFA and conditional access, and keep concise evidence of every lifecycle action to satisfy Compliance Framework requirements while reducing operational risk.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes