Article

/

30-01-2026

Offboarding Checklist for Growing Businesses: Remove Access Properly

Offboarding is one of the clearest tests of whether technology governance is actually working.

When it is handled well, access is removed on time, devices are recovered, shared workspaces stay under control, and the business knows exactly who still has access to what.

When it is handled poorly, former staff can retain access to email, files, Teams, business platforms, shared mailboxes, remote access tools, and even administrator privileges longer than anyone expects.

That creates risk quickly.

In growing businesses, poor offboarding usually shows up in familiar ways:

  • accounts are disabled late or not fully removed

  • file and mailbox access is forgotten after the person leaves

  • devices are not recovered or wiped properly

  • shared passwords or local access are not changed

  • vendor or platform access is overlooked

  • admin rights remain assigned to the wrong people

  • everyone assumes someone else handled it

This is why offboarding should never rely on memory.

It needs a clear checklist, clear ownership, and a repeatable process that works every time.

The good news is that most businesses do not need a complicated identity program to improve this. They need a practical standard that covers the basics properly and gets followed consistently.

Why offboarding usually breaks down

Offboarding failures rarely come from one big mistake. They usually come from a series of small gaps.

That tends to happen for a few reasons.

There is no single owner
HR, operations, finance, managers, and support providers may all play a part, but nobody owns the whole process end to end.

The process depends on memory
People remember the obvious things and miss the less visible ones.

Too many systems are involved
Microsoft 365, business platforms, shared mailboxes, device management, VPNs, finance tools, vendor portals, and collaboration tools all need attention.

Timing is unclear
The business is not clear on what should happen before the final day, on the day itself, and after the person leaves.

Access has grown over time
Longer-serving staff often accumulate extra access, shared accounts, and informal privileges that are easy to miss.

Vendors and partners are not included
Some access sits outside the core environment and does not get picked up by the internal checklist.

Once that happens, the business starts carrying avoidable exposure.

What good offboarding actually achieves

A practical offboarding process should create four outcomes.

Access is removed quickly
The person no longer has access to systems, information, or tools they should not retain.

Business continuity is protected
Files, mailboxes, devices, and work in progress are transferred or secured properly.

Risk is reduced
Old permissions, forgotten accounts, and unnecessary privileges are less likely to remain open.

Ownership is visible
The business knows who is responsible for each step and when it must be completed.

The goal is not to make offboarding bureaucratic. The goal is to make it consistent.

The signs your current offboarding process needs attention

If any of these sound familiar, your offboarding controls are probably weaker than they should be.

You do not have one documented checklist
Different teams do different things, depending on the person leaving.

Accounts are disabled, but not fully reviewed
Primary access may be removed, but shared mailboxes, file permissions, apps, and external platforms are missed.

Managers rely on the support provider to remember everything
That usually means the process is incomplete.

Devices and mobile access are handled inconsistently
Some devices are recovered properly, others are not.

No one reviews what the person actually had access to
The checklist covers standard access, but not the exceptions that built up over time.

Admin roles are not checked
Privileged access is one of the easiest things to miss and one of the riskiest things to leave open.

The business finds old access after the person has gone
That is usually a sign that the process is too informal.

These gaps do not always create an incident straight away, but they weaken control and increase risk over time.

A practical offboarding model that works

The best offboarding process is usually a simple one that is clear, complete, and repeatable.

1. Define who owns the process

The first step is making ownership visible.

That means being clear about:

  • who initiates offboarding

  • who confirms the final date and circumstances

  • who coordinates the checklist

  • who disables or removes access

  • who recovers devices

  • who confirms completion

Different teams may handle different steps, but one person or role should own the process end to end.

Without that, gaps are almost guaranteed.

2. Split the process into stages

Offboarding works best when it is separated into clear phases.

For example:

  • what happens before the final day

  • what happens on the final day

  • what happens immediately after

  • what gets reviewed afterwards

That helps the business avoid both rushed removal and forgotten follow-up.

It also helps where a departure is planned versus immediate.

3. Cover all access types, not just the obvious ones

A practical checklist should include more than the main user account.

That means reviewing:

  • Microsoft 365 sign-in access

  • email and mailbox access

  • Teams and shared workspace access

  • SharePoint, file shares, and shared folders

  • business applications and line-of-business systems

  • finance, CRM, project, HR, or operational platforms

  • VPN, remote access, Wi-Fi, or local access

  • device management and mobile access

  • privileged or administrative roles

  • external vendor portals and support systems

A lot of risk sits in the less visible access, not just the main login.

4. Protect business continuity as well as security

Good offboarding is not only about removal. It is also about handover.

That means deciding:

  • what happens to the mailbox

  • what happens to files and working documents

  • who needs access to the person’s shared work

  • whether there are scheduled tasks, approvals, or responsibilities that need transfer

  • whether there are accounts or relationships the business still needs to manage

If continuity is ignored, the business can end up secure but operationally disrupted.

5. Confirm completion properly

Offboarding should end with a clear confirmation that the checklist is complete.

That means being able to answer:

  • which accounts were removed

  • which permissions were reviewed

  • whether devices were recovered or wiped

  • whether shared access was transferred or removed

  • whether any exceptions remain open

  • who approved completion

If the business cannot answer those questions, the process is not complete enough.

What the checklist should include

A practical offboarding checklist does not need to be long, but it does need to be broad enough.

At a minimum, it should cover the following areas.

Core identity and sign-in access
Disable or remove primary account access, enforce sign-out where needed, and review authentication methods.

Email and collaboration
Review mailbox access, Teams membership, shared channels, calendars, contact lists, and any collaboration tools still tied to the user.

Files and shared workspaces
Check SharePoint, shared folders, OneDrive, document ownership, file handover, and access transfer where needed.

Devices and mobile access
Recover business devices, remove access from managed mobile devices, and confirm wipe or lock actions where appropriate.

Administrative privileges
Review admin groups, delegated roles, service access, password vault access, and elevated permissions.

Business systems and external platforms
Check finance systems, CRM, vendor platforms, HR systems, ticketing tools, support portals, and any line-of-business platforms.

Local and physical access where relevant
Where appropriate, include local device logins, Wi-Fi access, building access, keys, or shared physical resources.

Handover and continuity
Confirm what must be retained, who now owns it, and how the business will continue without losing visibility or control.

That is the level of completeness most growing businesses need.

What good offboarding looks like in day-to-day operations

Offboarding governance is not abstract. It shows up in practical questions like:

  • who starts the process

  • what happens before the final day

  • who disables the account

  • who checks shared access

  • what happens to the mailbox and files

  • who confirms the device is returned

  • who reviews admin access

  • how do we know the process is actually complete

If those answers are vague, the business is relying too much on good intentions.

If they are clear, offboarding becomes faster, safer, and easier to repeat.

Common mistakes businesses make

There are a few patterns that come up repeatedly.

Only disabling the main account
That removes obvious access but misses everything else around it.

Forgetting shared resources
Shared mailboxes, shared folders, Teams, and delegated access often remain in place longer than expected.

Ignoring administrative rights
Privileged access is easy to overlook and too risky to leave open.

Leaving it too late
If access removal only starts after the person has left, the process is already weaker than it should be.

Not involving the manager properly
Managers often know what work, access, or relationships need to be handed over.

Treating every departure the same
The process should be consistent, but some departures need tighter timing or additional review.

Assuming the support provider can infer everything
Without a clear checklist and business input, gaps will be missed.

A practical timing model

If the business wants a simple structure, break the checklist into three stages.

1. Before the final day

Use this stage to prepare.

That may include:

  • confirming the final date

  • identifying systems and exceptions

  • planning mailbox and file handover

  • preparing device return steps

  • clarifying any higher-risk access that needs immediate attention

2. On the final day

Use this stage for removal and control.

That may include:

  • disabling sign-in access

  • removing from groups or platforms

  • recovering devices

  • removing remote or mobile access

  • securing shared accounts where relevant

3. After the final day

Use this stage for confirmation and clean-up.

That may include:

  • checking for missed systems

  • confirming handover is complete

  • reviewing admin roles

  • closing outstanding tasks

  • documenting completion

This kind of timing model makes the process easier to run consistently.

Quick wins you can implement immediately

If your offboarding process feels informal or incomplete, start here.

1. Create one standard offboarding checklist

Bring everything into a single practical list instead of relying on separate team habits.

2. Assign one process owner

Even if multiple teams contribute, one person should coordinate it end to end.

3. Add privileged access review

Make sure admin groups, delegated roles, password vaults, and elevated permissions are always checked.

4. Include shared resources explicitly

Do not assume mailbox, file, Teams, or shared app access will be caught automatically.

5. Add a completion sign-off

Make it clear who confirms the checklist is finished and any exceptions are closed.

These steps alone can materially improve control.

Common mistakes to avoid

Making the checklist too vague
A checklist should name the actual areas that need review, not just say “remove access”.

Making the process too complex to follow
The standard needs to be practical enough that teams will actually use it consistently.

Separating offboarding from wider governance
Offboarding only works well when identity, access, devices, and business systems are governed properly in the first place.

Ignoring continuity
Removing access is critical, but so is retaining business information and operational handover.

Never reviewing the checklist
As new platforms and vendors are added, the checklist should be updated too.

How ProLevel Tech helps

If your offboarding process feels inconsistent, too manual, or riskier than it should be, the Technology Health Check is the best place to start.

It helps identify:

Where access is likely to be missed
Across Microsoft 365, shared workspaces, devices, and business systems.

Where privileged access needs tighter control
So administrative rights do not stay open longer than they should.

Where ownership is unclear
So the process can be coordinated properly from start to finish.

What the practical quick wins are
So the business can improve offboarding without launching a major identity project.

How the process should work going forward
With clearer governance, stronger access control, and better follow-through.

From there, Technology Leadership helps keep those standards in place through regular review, clearer ownership, vendor coordination, and practical governance across identity, access, devices, and handover processes.

Offboarding should be routine, not improvised

A practical offboarding process should cover:

  • user accounts and sign-in access

  • email, files, and shared workspaces

  • devices and mobile access

  • admin roles and privileged accounts

  • business systems and vendor platforms

  • ownership of the process from start to finish

Start with the Technology Health Check, then use Technology Leadership to keep access controls and offboarding standards consistent.

Gareth Llewellyn

Founder, ProLevel Tech

Ready to Get Started?

Book an intro call and let's talk about your technology challenges

Ready to Get Started?

Book an intro call and let's talk about your technology challenges

Ready to Get Started?

Book an intro call and let's talk about your technology challenges