Identity Offboarding Checklist: How to Reduce Risk and Strengthen Governance Across Cloud, SaaS and AD
Identity security is one of the most fundamental controls in any organisation, yet it is still one of the most common sources of avoidable risk.
When a member of staff leaves, changes role, or moves between departments, their access should update immediately and consistently across every system. In many organisations, it does not.
The result is predictable. Dormant accounts remain active for weeks or months. SaaS tools with no central ownership continue granting access long after a user has left. Local admin rights linger without review. These gaps create real exposure and are a common factor in many of the incidents we are asked to investigate.
Recent events such as the Louvre breach illustrate how a single unmanaged account or weak credential can escalate into a significant organisational failure. These are not advanced attacks. They are the result of basic governance controls not being applied consistently.
This guide sets out the practical steps every organisation can take to close identity offboarding gaps and build a reliable, repeatable, and auditable process that reduces risk.
Why Identity Offboarding Still Fails
Identity offboarding sounds simple, yet it consistently breaks down in large environments. The reasons are nearly always the same.
1. HR is not connected to identity systems
When HR removes a leaver from payroll or updates their role, the change is not reflected in identity systems. Cloud platforms, SaaS tools, and legacy apps all operate on their own timelines and processes. Without direct integration, identity teams rely on manual tasks that are easy to miss.
2. SaaS sprawl creates shadow identities
Departments adopt SaaS applications directly, often outside procurement or governance. These tools are rarely connected to the central Identity Provider, which means user access must be removed manually. This is rarely done reliably.
3. Legacy systems sit outside modern controls
Older systems that cannot integrate with SSO or the central IdP rely on local accounts. These accounts are easy to forget, difficult to track, and almost never deprovisioned correctly.
4. No single owner is accountable
HR believes IT will remove access. IT believes HR has logged the leaver. Application owners assume someone else has handled it. With no clear ownership model, gaps appear quickly.
5. Volume and complexity overwhelm manual processes
In organisations with thousands of employees and hundreds of applications, manual offboarding is unmanageable. Without automation, errors are inevitable.
What Good Identity Offboarding Looks Like
Strong identity offboarding has three characteristics:
It is automated, connected, and consistent.
HR becomes the authoritative source of truth for identity events. When a leaver is recorded in the HR system, identity changes flow automatically to the central IdP, cloud platforms, and SaaS tools. Local accounts are minimised and monitored. Evidence is logged and auditable.
This model reduces risk, reduces manual effort, and ensures that access is removed at the point of departure, not weeks later.
The Identity Offboarding Checklist
Use this checklist as a baseline for securing leavers across cloud, SaaS, and legacy environments. This is written for CIOs, CISOs, IT Directors, and governance leads who want a clear, practical framework.
Step 1: Link HR to the Identity Provider
The HR system must be the primary trigger for all identity lifecycle events.
When HR marks a user as a leaver:
Their status is updated in the IdP automatically.
Downstream access is revoked at the same time.
No manual intervention is required to initiate the process.
This removes ambiguity and ensures offboarding begins instantly.
Step 2: Revoke Access Across All Digital Platforms
Once the IdP is updated, access should be removed automatically across:
Cloud platforms (Azure, AWS, GCP)
Internal Active Directory
Core enterprise applications (ERP, CRM, Finance, HR)
SaaS tools federated to SSO
Developer platforms and CI/CD systems
VPN and remote access tools
Access to email, collaboration platforms, and remote access systems should be revoked immediately. Token invalidation should happen in real-time.
Step 3: Close or Rotate Accounts Not Integrated with the IdP
Not every system integrates perfectly. For anything outside the IdP workflow:
Disable the account
Reset or rotate passwords
Remove group memberships
Remove access keys or API tokens
Log the action for audit
Shared or system accounts should be reviewed to ensure the leaver’s credentials do not persist. Privileged and local admin accounts must be prioritised.
Step 4: Remove from Groups, Roles, and Privileged Access
The leaver should be removed from:
Security groups
Azure AD roles
AWS IAM roles
GCP IAM bindings
SaaS admin permissions
Local administrator groups
Any privileged access should be revoked first. This reduces blast radius immediately.
Step 5: Recover Licences and Assign Assets
Deprovisioning is also an opportunity to recover:
SaaS licences
Cloud subscriptions
Expensive enterprise seats
Hardware tokens
Device management profiles
This improves cost efficiency and ensures assets are not lost.
Step 6: Review Shared Credentials and API Keys
If a leaver had access to:
Shared passwords
Shared API keys
Admin service accounts
Break-glass credentials
these must be rotated immediately. This is one of the most common sources of post-departure exposure.
Step 7: Produce an Audit Log of All Actions
A complete record should be available showing:
Date of leaver event
Systems where access was removed
Time stamps for each system
Outstanding manual actions
Final sign-off
This is essential for internal audit, external regulators, and governance assurance.
What to Automate
To reduce operational effort and eliminate errors:
Automatic deprovisioning triggered from HR
Automatic licence recovery
Automatic removal from cloud and SaaS applications
Automatic revocation of tokens and sessions
Automatic attestation workflows
Automatic reporting to security and audit teams
Automation improves both security and efficiency, and it removes the risk of human error during high-volume periods.
Core Metrics to Measure Maturity
CIOs and CISOs should track:
Percentage of applications connected to SSO
Percentage of leavers deprovisioned within 60 minutes
Number of orphaned accounts per quarter
Number of privileged accounts without MFA
Percentage of local admin accounts remaining
Volume of unassigned or unused licences
These metrics provide a clear picture of operational health.
FAQs
What if an application cannot integrate with the IdP?
You must have a manual process and assigned owner for deprovisioning. Consider replacing the application if it presents ongoing governance issues.
How quickly should a leaver be deprovisioned?
Within one hour. Anything longer increases risk.
What about contractors and third parties?
They should be managed with the same controls and timelines. End dates must be recorded in the HR or vendor management system.
How do we handle service accounts?
No employee should own a service account. Shared accounts should be rotated at every leaver event.
Reduce Risk, Improve Governance, Strengthen Control
Identity offboarding is one of the simplest and most effective ways to reduce organisational risk. Yet it is also one of the most consistently overlooked.
If your organisation wants to strengthen identity governance, close leaver gaps, or automate identity lifecycle management, we can help.
Book a call with our team to discuss your current identity processes and where automation can make the greatest impact.