Identity Deprovisioning

Identity deprovisioning requires disabling and removing user accounts when employees leave, change roles, or no longer need access. You must implement automated or manual processes to revoke access within defined timeframes and maintain audit trails of all deprovisioning actions.

Key takeaways:

  • Deprovisioning must occur promptly when access is no longer required
  • Document all deprovisioning activities with timestamps and approvals
  • Regular access reviews catch orphaned accounts missed during offboarding
  • Coordinate deprovisioning across all systems, not just primary directories
  • Retain deprovisioning records for audit and compliance verification

Identity deprovisioning sits at the intersection of security and operational efficiency. Every active but unnecessary account represents both a security vulnerability and a compliance failure waiting to happen. The C2M2 framework specifically requires organizations to "deactivate and remove identities in a timely manner when they are no longer needed" (C2M2 v2.1 ACCESS-1.B).

Most organizations struggle with the "timely manner" component. HR notifies IT about departures, but what about contractors whose projects end quietly? Role changes that leave elevated privileges behind? Service accounts for decommissioned applications? These gaps create what auditors call "ghost accounts" — active identities with no legitimate business purpose.

The requirement applies to all identity types: employees, contractors, service accounts, API keys, and privileged accounts. Energy sector organizations and critical infrastructure operators face particular scrutiny given the potential impact of unauthorized access. But any organization handling sensitive data needs robust deprovisioning processes.

Regulatory text

The Cybersecurity Capability Maturity Model v2.1 states: "Identities are deprovisioned when no longer required" (ACCESS-1.B MIL1). This deceptively simple statement masks significant operational complexity.

"No longer required" triggers include:

  • Employee termination or resignation
  • Contractor engagement completion
  • Role changes eliminating need for specific access
  • Project conclusion
  • Application decommissioning
  • Vendor relationship termination

"Deprovisioning" encompasses more than account deletion. Complete deprovisioning requires:

  • Disabling authentication credentials
  • Revoking access tokens and API keys
  • Removing group memberships and role assignments
  • Clearing cached credentials from systems
  • Recovering physical access badges and devices
  • Archiving or transferring data ownership

Who This Applies To

Energy sector organizations implementing C2M2 must address this requirement at Maturity Indicator Level 1 (MIL1), making it foundational. Critical infrastructure operators face similar requirements under various frameworks.

The requirement extends beyond IT departments. Stakeholders include:

  • Human Resources: Initiating termination workflows
  • Managers: Approving access changes and transfers
  • IT Operations: Executing technical deprovisioning
  • Security Teams: Monitoring for policy violations
  • Compliance: Verifying process effectiveness

Third parties managing identities on your behalf remain your responsibility. Cloud service providers, managed service providers, and software vendors must demonstrate their deprovisioning capabilities.

Step-by-Step Implementation

Phase 1: Current State Assessment

  1. Inventory all identity sources: Active Directory, cloud directories, application-specific databases, privileged access management systems
  2. Map deprovisioning triggers: Document every scenario requiring identity removal
  3. Analyze existing processes: Time current deprovisioning activities from trigger to completion
  4. Identify gaps: Find systems lacking deprovisioning procedures or automation

Phase 2: Process Design

  1. Define SLAs by risk level:
    • Critical/privileged accounts: 4 hours
    • Standard user accounts: 24 hours
    • Low-risk service accounts: 72 hours
  2. Create workflow templates:
    • Voluntary termination checklist
    • Involuntary termination rapid response
    • Role change access review
    • Contractor offboarding sequence
  3. Establish approval chains: Who authorizes permanent deletion versus suspension?
  4. Design failsafes: Manager leaves before approving subordinate's deprovisioning

Phase 3: Technical Implementation

  1. Enable native deprovisioning features in identity providers
  2. Deploy automation tools for cross-system deprovisioning
  3. Configure audit logging to capture all deprovisioning events
  4. Implement account lifecycle policies (automatic disabling after X days inactive)
  5. Create deprovisioning APIs for systems lacking native capabilities

Phase 4: Monitoring and Maintenance

  1. Schedule periodic access reviews (quarterly minimum)
  2. Monitor deprovisioning SLA compliance
  3. Test restoration procedures for incorrectly deprovisioned accounts
  4. Update procedures as new systems come online

Required Evidence and Artifacts

Auditors expect comprehensive documentation proving consistent deprovisioning:

Policy Documentation:

  • Deprovisioning policy with defined triggers and timelines
  • Procedures for each identity type and system
  • Exception handling processes
  • Data retention requirements

Operational Evidence:

  • Deprovisioning request logs with timestamps
  • Approval records for each deprovisioning action
  • System audit logs showing account status changes
  • Access review reports highlighting orphaned accounts
  • SLA compliance metrics

Testing Artifacts:

  • Deprovisioning drill results
  • Restoration test outcomes
  • Third-party attestation reports

Common Exam Questions and Audit Findings

Auditors consistently probe these areas:

"Show me your deprovisioning from last Tuesday": Can you produce complete records for a specific event? Missing logs fail this test.

"How do you handle emergency terminations?": Auditors test high-risk scenarios. Document and practice rapid deprovisioning procedures.

"What about privileged accounts?": Standard user deprovisioning often works well, but privileged account processes lag. Show equal rigor across all account types.

"Prove accounts stay deprovisioned": Some systems reactivate accounts automatically. Demonstrate ongoing verification that deprovisioned accounts remain disabled.

Common audit findings include:

  • Service accounts with departed employee names
  • Delays between HR notification and IT action
  • Incomplete deprovisioning across federated systems
  • Missing audit trails for manual deprovisioning
  • No process for contractor account review

Implementation Pitfalls and Prevention

Pitfall 1: HR-IT Communication Gaps Prevention: Integrate HR systems with IT service management. Automated tickets beat email notifications.

Pitfall 2: Incomplete System Inventory Prevention: Maintain a configuration management database (CMDB) tracking all systems with identity stores. Update it before each access review.

Pitfall 3: Manager Approval Bottlenecks Prevention: Define delegation rules and timeout escalations. After 48 hours, escalate to skip-level management.

Pitfall 4: Over-Aggressive Deprovisioning Prevention: Implement "soft delete" periods. Disable immediately, delete after 30-90 days.

Pitfall 5: Shared Account Neglect Prevention: Convert shared accounts to individual accounts where possible. For necessary shared accounts, implement stricter review cycles.

Risk and Enforcement Context

While C2M2 doesn't specify monetary penalties, implementation failures create multiple risks:

Security Risks: Every unnecessary active account expands the attack surface. Disgruntled former employees with active credentials pose insider threats.

Compliance Risks: Other regulations (SOX, HIPAA, PCI-DSS) include identity management requirements. C2M2 non-compliance often indicates broader control failures.

Operational Risks: Orphaned accounts consume licenses, skew access analytics, and complicate incident response.

Reputation Risks: Security breaches through terminated employee accounts generate particularly damaging headlines.

30/60/90-Day Implementation Plan

Immediate Actions (Days 1-30)

  • Conduct emergency review of recent terminations (last 90 days)
  • Disable any discovered orphaned accounts
  • Document current deprovisioning procedures, however informal
  • Identify systems lacking any deprovisioning process
  • Assign single point of accountability for deprovisioning

Near-Term Improvements (Days 31-60)

  • Implement automated HR-to-IT termination notifications
  • Create deprovisioning checklists for each role type
  • Configure audit logging in primary identity systems
  • Establish SLAs for deprovisioning by account risk level
  • Train relevant staff on updated procedures

Ongoing Maturity (Days 61-90)

  • Deploy automated deprovisioning for core systems
  • Implement quarterly access reviews
  • Create management dashboards for deprovisioning metrics
  • Test emergency deprovisioning procedures
  • Schedule third-party deprovisioning assessment

Post-90 days, focus on expanding automation, reducing manual touchpoints, and improving cross-system orchestration.

Frequently Asked Questions

How quickly must accounts be deprovisioned under C2M2?

C2M2 v2.1 requires deprovisioning "when no longer required" without specifying exact timeframes. Industry practice suggests 24 hours for standard accounts, 4 hours for privileged accounts.

Does deprovisioning mean immediate deletion?

No. Deprovisioning means removing access capabilities. Many organizations disable accounts immediately but retain them for 30-90 days for audit trails and potential reactivation needs.

What about contractor accounts with future return dates?

Disable accounts between engagements. Create fresh accounts for returning contractors rather than reactivating old ones. This ensures clean access provisioning and audit trails.

How do we handle service accounts tied to applications?

Document service account ownership and include them in quarterly reviews. When applications are decommissioned, their service accounts must be deprovisioned simultaneously.

Should we deprovision or transfer accounts during role changes?

Remove access no longer needed for the new role. Create new accounts when permissions differ significantly. Document the decision rationale for audit purposes.

What evidence satisfies C2M2 auditors for this requirement?

Auditors expect deprovisioning policies, procedures, request logs, system audit trails showing account status changes, and evidence of regular access reviews catching missed deprovisions.

Frequently Asked Questions

How quickly must accounts be deprovisioned under C2M2?

C2M2 v2.1 requires deprovisioning "when no longer required" without specifying exact timeframes. Industry practice suggests 24 hours for standard accounts, 4 hours for privileged accounts.

Does deprovisioning mean immediate deletion?

No. Deprovisioning means removing access capabilities. Many organizations disable accounts immediately but retain them for 30-90 days for audit trails and potential reactivation needs.

What about contractor accounts with future return dates?

Disable accounts between engagements. Create fresh accounts for returning contractors rather than reactivating old ones. This ensures clean access provisioning and audit trails.

How do we handle service accounts tied to applications?

Document service account ownership and include them in quarterly reviews. When applications are decommissioned, their service accounts must be deprovisioned simultaneously.

Should we deprovision or transfer accounts during role changes?

Remove access no longer needed for the new role. Create new accounts when permissions differ significantly. Document the decision rationale for audit purposes.

What evidence satisfies C2M2 auditors for this requirement?

Auditors expect deprovisioning policies, procedures, request logs, system audit trails showing account status changes, and evidence of regular access reviews catching missed deprovisions.

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream