🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Build a Termination Playbook to Secure Systems Containing CUI — Implementation Checklist for NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Practical, step-by-step guidance to build a termination playbook that promptly revokes access and secures systems containing CUI to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.2 compliance.

March 28, 2026
5 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Terminating access to systems that store, process, or transmit Controlled Unclassified Information (CUI) is one of the highest-risk events for small businesses handling federal data — and PS.L2-3.9.2 in NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 requires a repeatable, documented approach to ensure those accesses are removed quickly and completely. This post gives a practical termination playbook and an implementation checklist with technical examples, compliance evidence ideas, and small-business scenarios you can adopt immediately.

What PS.L2-3.9.2 Requires (Key Objectives)

The control requires that organizations have defined procedures to terminate access to organizational systems and CUI when employees, contractors, or other personnel are transferred, terminated, or no longer require access. Key objectives are: (1) promptly remove logical and physical access; (2) preserve evidence for audits; (3) ensure CUI remains protected after separation; and (4) maintain documented roles and escalation paths. Your playbook must be measurable, repeatable, and demonstrable to an assessor.

Termination Playbook — Implementation Checklist

Build your playbook as a structured checklist that maps HR triggers to technical actions and evidence collection. Core items: (a) triggers and timing (resignation, termination for cause, contract end, role change); (b) responsible parties (HR, IT, security, facilities, managers); (c) scope (accounts, keys, devices, physical badges); (d) timelines (immediate for high-risk, within 24 hours for routine separations); (e) audit artifacts (ticket ID, timestamps, screenshots, logs); and (f) post-termination actions (asset return, exit interview, data preservation). Document each step with the owner and SLAs.

Procedural Steps (high-level)

Create a workflow that starts with an HR event feed (HRIS, Payroll, or ticket). Example sequence: HR raises an offboarding ticket → Manager confirms CUI access list → IT receives automated webhook → Identity provider deprovisions account → MDM wipes device and EDR isolates endpoints → Facilities revokes badge → Security archives logs. For small businesses, integrate simple automation: use Zapier/Workato or an HRIS webhook to create a ticket in Jira/ServiceNow/Zoho with the required checklist items.

Technical Implementation Details

Technical actions must cover identity, endpoints, cloud, secrets, and network access. Examples: disable Active Directory/Azure AD account via PowerShell, revoke Okta user sessions and tokens via API, remove AWS IAM user keys and detach policies using aws-cli, rotate Vault secrets and revoke tokens, change shared passwords in your enterprise password manager, revoke VPN certificates, and perform an MDM remote wipe (Intune, Jamf). Example commands (illustrative):

# Disable Azure AD user (PowerShell)
Disable-AzureADUser -ObjectId user@company.com

# Revoke AWS access keys
aws iam update-access-key --access-key-id AKIA... --status Inactive --user-name departing-user
Also ensure EDR (CrowdStrike/Carbon Black) isolates the endpoint and that backups containing CUI are tagged and retained but not accessible to the departed user. Maintain scripts in a secured runbook repository and require MFA and privileged approval to execute.

Small-Business Scenarios and Practical Examples

Scenario A — Remote contractor completes a contract: HR marks contractor as completed in the HRIS. A webhook creates a ticket; IT uses the IdP (e.g., Okta) to revoke sessions and deprovision the account within 1 hour; MDM unenrolls the contractor device and EDR confirms no active sessions. Scenario B — Employee terminated for cause: immediate IT lockout, reset service account credentials that the user had access to, revoke SSH keys associated with the user on internal servers, rotate shared secrets in HashiCorp Vault, and perform a forensic snapshot of the user workstation for investigators. For constrained budgets, small businesses should rely on SaaS tools with built-in connectors (Okta + Intune + CrowdStrike) to automate most of these steps.

Compliance Evidence, Documentation, and Audit Readiness

Auditors will want evidence that the procedures were followed. Maintain: (1) ticket history showing timestamps and owners; (2) IdP logs showing disabled accounts and token revocations; (3) MDM/EDR logs showing wipes and isolates; (4) cloud provider logs showing IAM key deactivation; (5) screenshots of password manager changes; and (6) a signed offboarding checklist (HR + manager). Retain these artifacts according to your contracts and NIST/CMMC evidence expectations — typically a minimum of 12 months, but follow contract-specific retention. Include a summary report for each termination event in a secure evidence repository.

Risks of Not Implementing the Playbook

Failure to promptly remove access exposes CUI to unauthorized disclosure, lateral movement, credential abuse, and supply-chain compromise. Real consequences include data breaches, contract termination, loss of DIBCAC/CMMC certification, financial penalties, and reputational damage. Insider threats are common: a single retained VPN credential or SSH key can allow exfiltration of CUI long after separation. For small businesses, one breach can sink a contractor relationship with a prime or government customer.

Best Practices and Testing

Best practices: enforce least privilege and role-based access control; centralize identity and secrets; use privileged access management for admins; require MFA for all access; rotate shared secrets on user deprovision; and build automation so manual tasks are minimized. Regularly test your playbook with tabletop exercises and at least annual live drills that simulate different termination types (voluntary, involuntary, contractor end). Update SLAs and playbook steps based on lessons learned and log the drill results as evidence of continuous improvement.

Summary: For NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 PS.L2-3.9.2 compliance, create a documented termination playbook that ties HR events to automated technical actions, defines roles and SLAs, captures audit artifacts, and is exercised regularly. Small businesses can achieve strong protection for CUI by using identity-first automation (IdP + MDM + EDR), encrypting and tagging CUI, and keeping an evidence trail for every deprovisioning event — reducing risk and demonstrating compliance to assessors.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes