Leaver / Off-boarding Checklist
Process Checklist
Off-boarding/Leavers
When an employee leaves the company, you'll need to remove them from all information technology assets. Before doing so, you should block them from accessing company files, preserve the documents they created, and perform several other admin tasks associated with removing a user. Both Microsoft 365 and Google require you to maintain licensing on accounts until account deletion.
Process Overview:
When was the last time you reviewed your offboarding checklist? _________________?
How would you characterize this request and effort required?
Offboarding:
Disable a user (30 min)
Disable a user with data migration? (60 min)
Disable a user and enable another user to access resources? (2 hours)
Succession:
Transition job roles from one user to another? (4+ hours)
What date is the new person taking over? ______________?
What is your most important (pick 1) objective:
Secure the account.
Account takeover.
Forensics/Evidence/Crime.
Review: asset inventory by visiting https://www.bentosecurity.com/login and logging into your respective portal.
Collect Off-boarding information. Our security team needs the following items from you:
Departure Type
Standard (no special requirements).
We will collect some evidence.
This option allows us to delete data.
Priority (short notice or medium/high risk).
We will collect and review evidence.
This option automatically requires us to preserve data.
You will be charged against your incident retainer.
Account Change:
Sign-out and Block Sign-In (Disable account) (Secure)
Change password (Not Secure)
Rename the account (Never advised)
Last Day / Termination Date is ______________________.
E-Mail forwarding requirements.
Forward E-Mail to ____________________.
Don’t forward.
Do you need a message sent to external senders indicating the change?
No, nothing to do.
Yes (setup reply rule - only available for M365/Exchange Online)
Mobile Devices
Do nothing
Audit and Review Risk
Attempt to Wipe
Personal data or document retention requirements.
Delete immediately
Keep data for now
Migrate data to another user
Grant access to another user
Third-party app risks
Review OATH and API access
Skip
Mailbox retention requirements.
Delete immediately
Keep data for now (you will notify when ready to remove)
Grant access to another user
Migrate data to another user
Hardware retention requirements.
Repurpose
Preserve/Retain/Hold
Retire
Workstation identifier/serial is ____________________?
Workstation immediate steps are to:
Lockout
Change Password
Reassign to another user.
Do nothing.
Task List for Access Control?
What other services will you need to disable?
Have you verified all mission-critical system procedures and taken action?
Have you verified all other system procedures and taken action?
What other things are you planning to do with this departure?
___________________
___________________
___________________
___________________
___________________
Submit the request to your Security Operations Team via established process or e-mail to support@bentosecurity.com.
Requests need at least 2 business days to be considered Standard.
Requests with less than 2 business day notice are considered Priority.
Succession process requires a block of time booked for the transition.
Be sure to schedule time with our team if you want handling beyond Best Effort.