Skip to main content

Deep Dive - Termination of Access and Access Removal Procedures

Also referred to as access removal, or offboarding, the termination of access control refers to both logical and physical access

Elliott Harnagel avatar
Written by Elliott Harnagel
Updated over 2 years ago

What is the Termination of Access control?

Strike Graph's default control language is: “A user's physical and logical access to IT systems is revoked within 48 hours of termination or transfer and all assets are returned to the organization when employment ends or their contract terminates. Exceptions are documented in an offboarding checklist and/or offboarding ticket.”

This language should be customized to reflect the specific process (and window for termination) that your organization has defined. For example, if your organization always removes access within 24 hours of the termination notice, then you should update the control to reflect that. It’s important to set a termination period that is achievable for your organization, SOC 2 auditors will be testing the control based on the requirements you define. So if you don’t think you’ll be able to remove access within 24 hours every time, set the interval to be longer. This termination interval should also be defined within your Logical Access Policy.

Who is involved with this control?

Typical control owner: CISO or Head of IT

Typical parties involved: Help Desk (for de-provisioning)

How often should I perform this control?

Typical frequency: Continuous

Which framework is this for?

  • SOC 2 - typically used by larger, more mature organizations

  • PCI - Required

  • ISO 27001 - General concept

  • NIST 800-171 - General concept

Why is this control important?

The removal of access rights (both logical and physical) when a staff member leaves an organization reduces the risk from inappropriate access to information, locations, processes, and security systems. Many organizations strive for a 24-48 hour window to ensure that all access rights have been locked down, removed, or otherwise made unavailable to the terminated individual.

What does evidence look like for this control?

Three evidence items are generally needed for this control:

  • Termination List (SOC 2 Type 2 only)

    • This list should be generated from your HRIS or payroll system and should show all employees terminated within your SOC 2 audit review period. During the audit, the auditor will select a sample of terminated employees that they want to see the full termination tickets/checklists.

  • Access Termination Ticket

    • This should be a ticket or offboarding checklist showing that all access has been removed for an example terminated employee. The auditor will be checking to make sure the ticket or checklist was completed within the interval specified in the control. For example, if you specify in your control and policy that access is removed within 24 hours of termination, but the termination ticket shows that access was actually removed 48 hours after termination, that can lead to finding or exception in your audit report.

    • If a terminated user’s accounts need to be kept on for the sake of continuity that is OK, but be sure to clearly note on the ticket or checklist that the terminated employee can no longer access their old account because the password was changed or the account was deactivated.

  • Access Termination Procedures

    • These can be included within your Logical Access Policy, or they can be a standalone procedures document. We have an example procedures document, but this is a process that will likely be somewhat different from organization to organization, so you should take care to write a procedures document that closely matches your process.

    • Generally, this procedures document should include information on who initially notifies the IT department of the access removal request, how that notification is logged, who performs the work of removing the accounts, and whether there is any notification to affected parties (HR and departing employees’ manager) once access removal is complete.

Did this answer your question?