Article
/
30-01-2026
Offboarding Checklist for Growing Businesses: Remove Access Properly

Offboarding is one of the clearest tests of whether technology governance is actually working.
When it is handled well, access is removed on time, devices are recovered, shared workspaces stay under control, and the business knows exactly who still has access to what.
When it is handled poorly, former staff can retain access to email, files, Teams, business platforms, shared mailboxes, remote access tools, and even administrator privileges longer than anyone expects.
That creates risk quickly.
In growing businesses, poor offboarding usually shows up in familiar ways:
accounts are disabled late or not fully removed
file and mailbox access is forgotten after the person leaves
devices are not recovered or wiped properly
shared passwords or local access are not changed
vendor or platform access is overlooked
admin rights remain assigned to the wrong people
everyone assumes someone else handled it
This is why offboarding should never rely on memory.
It needs a clear checklist, clear ownership, and a repeatable process that works every time.
The good news is that most businesses do not need a complicated identity program to improve this. They need a practical standard that covers the basics properly and gets followed consistently.
Why offboarding usually breaks down
Offboarding failures rarely come from one big mistake. They usually come from a series of small gaps.
That tends to happen for a few reasons.
There is no single owner
HR, operations, finance, managers, and support providers may all play a part, but nobody owns the whole process end to end.
The process depends on memory
People remember the obvious things and miss the less visible ones.
Too many systems are involved
Microsoft 365, business platforms, shared mailboxes, device management, VPNs, finance tools, vendor portals, and collaboration tools all need attention.
Timing is unclear
The business is not clear on what should happen before the final day, on the day itself, and after the person leaves.
Access has grown over time
Longer-serving staff often accumulate extra access, shared accounts, and informal privileges that are easy to miss.
Vendors and partners are not included
Some access sits outside the core environment and does not get picked up by the internal checklist.
Once that happens, the business starts carrying avoidable exposure.
What good offboarding actually achieves
A practical offboarding process should create four outcomes.
Access is removed quickly
The person no longer has access to systems, information, or tools they should not retain.
Business continuity is protected
Files, mailboxes, devices, and work in progress are transferred or secured properly.
Risk is reduced
Old permissions, forgotten accounts, and unnecessary privileges are less likely to remain open.
Ownership is visible
The business knows who is responsible for each step and when it must be completed.
The goal is not to make offboarding bureaucratic. The goal is to make it consistent.
The signs your current offboarding process needs attention
If any of these sound familiar, your offboarding controls are probably weaker than they should be.
You do not have one documented checklist
Different teams do different things, depending on the person leaving.
Accounts are disabled, but not fully reviewed
Primary access may be removed, but shared mailboxes, file permissions, apps, and external platforms are missed.
Managers rely on the support provider to remember everything
That usually means the process is incomplete.
Devices and mobile access are handled inconsistently
Some devices are recovered properly, others are not.
No one reviews what the person actually had access to
The checklist covers standard access, but not the exceptions that built up over time.
Admin roles are not checked
Privileged access is one of the easiest things to miss and one of the riskiest things to leave open.
The business finds old access after the person has gone
That is usually a sign that the process is too informal.
These gaps do not always create an incident straight away, but they weaken control and increase risk over time.
A practical offboarding model that works
The best offboarding process is usually a simple one that is clear, complete, and repeatable.
1. Define who owns the process
The first step is making ownership visible.
That means being clear about:
who initiates offboarding
who confirms the final date and circumstances
who coordinates the checklist
who disables or removes access
who recovers devices
who confirms completion
Different teams may handle different steps, but one person or role should own the process end to end.
Without that, gaps are almost guaranteed.
2. Split the process into stages
Offboarding works best when it is separated into clear phases.
For example:
what happens before the final day
what happens on the final day
what happens immediately after
what gets reviewed afterwards
That helps the business avoid both rushed removal and forgotten follow-up.
It also helps where a departure is planned versus immediate.
3. Cover all access types, not just the obvious ones
A practical checklist should include more than the main user account.
That means reviewing:
Microsoft 365 sign-in access
email and mailbox access
Teams and shared workspace access
SharePoint, file shares, and shared folders
business applications and line-of-business systems
finance, CRM, project, HR, or operational platforms
VPN, remote access, Wi-Fi, or local access
device management and mobile access
privileged or administrative roles
external vendor portals and support systems
A lot of risk sits in the less visible access, not just the main login.
4. Protect business continuity as well as security
Good offboarding is not only about removal. It is also about handover.
That means deciding:
what happens to the mailbox
what happens to files and working documents
who needs access to the person’s shared work
whether there are scheduled tasks, approvals, or responsibilities that need transfer
whether there are accounts or relationships the business still needs to manage
If continuity is ignored, the business can end up secure but operationally disrupted.
5. Confirm completion properly
Offboarding should end with a clear confirmation that the checklist is complete.
That means being able to answer:
which accounts were removed
which permissions were reviewed
whether devices were recovered or wiped
whether shared access was transferred or removed
whether any exceptions remain open
who approved completion
If the business cannot answer those questions, the process is not complete enough.
What the checklist should include
A practical offboarding checklist does not need to be long, but it does need to be broad enough.
At a minimum, it should cover the following areas.
Core identity and sign-in access
Disable or remove primary account access, enforce sign-out where needed, and review authentication methods.
Email and collaboration
Review mailbox access, Teams membership, shared channels, calendars, contact lists, and any collaboration tools still tied to the user.
Files and shared workspaces
Check SharePoint, shared folders, OneDrive, document ownership, file handover, and access transfer where needed.
Devices and mobile access
Recover business devices, remove access from managed mobile devices, and confirm wipe or lock actions where appropriate.
Administrative privileges
Review admin groups, delegated roles, service access, password vault access, and elevated permissions.
Business systems and external platforms
Check finance systems, CRM, vendor platforms, HR systems, ticketing tools, support portals, and any line-of-business platforms.
Local and physical access where relevant
Where appropriate, include local device logins, Wi-Fi access, building access, keys, or shared physical resources.
Handover and continuity
Confirm what must be retained, who now owns it, and how the business will continue without losing visibility or control.
That is the level of completeness most growing businesses need.
What good offboarding looks like in day-to-day operations
Offboarding governance is not abstract. It shows up in practical questions like:
who starts the process
what happens before the final day
who disables the account
who checks shared access
what happens to the mailbox and files
who confirms the device is returned
who reviews admin access
how do we know the process is actually complete
If those answers are vague, the business is relying too much on good intentions.
If they are clear, offboarding becomes faster, safer, and easier to repeat.
Common mistakes businesses make
There are a few patterns that come up repeatedly.
Only disabling the main account
That removes obvious access but misses everything else around it.
Forgetting shared resources
Shared mailboxes, shared folders, Teams, and delegated access often remain in place longer than expected.
Ignoring administrative rights
Privileged access is easy to overlook and too risky to leave open.
Leaving it too late
If access removal only starts after the person has left, the process is already weaker than it should be.
Not involving the manager properly
Managers often know what work, access, or relationships need to be handed over.
Treating every departure the same
The process should be consistent, but some departures need tighter timing or additional review.
Assuming the support provider can infer everything
Without a clear checklist and business input, gaps will be missed.
A practical timing model
If the business wants a simple structure, break the checklist into three stages.
1. Before the final day
Use this stage to prepare.
That may include:
confirming the final date
identifying systems and exceptions
planning mailbox and file handover
preparing device return steps
clarifying any higher-risk access that needs immediate attention
2. On the final day
Use this stage for removal and control.
That may include:
disabling sign-in access
removing from groups or platforms
recovering devices
removing remote or mobile access
securing shared accounts where relevant
3. After the final day
Use this stage for confirmation and clean-up.
That may include:
checking for missed systems
confirming handover is complete
reviewing admin roles
closing outstanding tasks
documenting completion
This kind of timing model makes the process easier to run consistently.
Quick wins you can implement immediately
If your offboarding process feels informal or incomplete, start here.
1. Create one standard offboarding checklist
Bring everything into a single practical list instead of relying on separate team habits.
2. Assign one process owner
Even if multiple teams contribute, one person should coordinate it end to end.
3. Add privileged access review
Make sure admin groups, delegated roles, password vaults, and elevated permissions are always checked.
4. Include shared resources explicitly
Do not assume mailbox, file, Teams, or shared app access will be caught automatically.
5. Add a completion sign-off
Make it clear who confirms the checklist is finished and any exceptions are closed.
These steps alone can materially improve control.
Common mistakes to avoid
Making the checklist too vague
A checklist should name the actual areas that need review, not just say “remove access”.
Making the process too complex to follow
The standard needs to be practical enough that teams will actually use it consistently.
Separating offboarding from wider governance
Offboarding only works well when identity, access, devices, and business systems are governed properly in the first place.
Ignoring continuity
Removing access is critical, but so is retaining business information and operational handover.
Never reviewing the checklist
As new platforms and vendors are added, the checklist should be updated too.
How ProLevel Tech helps
If your offboarding process feels inconsistent, too manual, or riskier than it should be, the Technology Health Check is the best place to start.
It helps identify:
Where access is likely to be missed
Across Microsoft 365, shared workspaces, devices, and business systems.
Where privileged access needs tighter control
So administrative rights do not stay open longer than they should.
Where ownership is unclear
So the process can be coordinated properly from start to finish.
What the practical quick wins are
So the business can improve offboarding without launching a major identity project.
How the process should work going forward
With clearer governance, stronger access control, and better follow-through.
From there, Technology Leadership helps keep those standards in place through regular review, clearer ownership, vendor coordination, and practical governance across identity, access, devices, and handover processes.
Offboarding should be routine, not improvised
A practical offboarding process should cover:
user accounts and sign-in access
email, files, and shared workspaces
devices and mobile access
admin roles and privileged accounts
business systems and vendor platforms
ownership of the process from start to finish
Start with the Technology Health Check, then use Technology Leadership to keep access controls and offboarding standards consistent.

Gareth Llewellyn
Founder, ProLevel Tech


