🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Train Managers and IT to Execute Immediate CUI Safeguards During Offboarding — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - PS.L2-3.9.2

Practical guidance for training managers and IT to promptly remove or mitigate Controlled Unclassified Information (CUI) access during offboarding to meet NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 PS.L2-3.9.2 requirements.

April 23, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how to train managers and IT staff to execute immediate Controlled Unclassified Information (CUI) safeguards during offboarding in order to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control PS.L2-3.9.2—covering policy, playbooks, automation, and real-world small-business scenarios so your organization can remove access quickly, consistently, and with auditable evidence.

Implementation overview: what "immediate safeguards" means in practice

NIST SP 800-171 and CMMC require that access to CUI is promptly removed or mitigated when personnel change roles or leave. For a small business, “promptly” should be defined in your policy (typical SLAs are 15 minutes to 4 hours for account disablement and 24 hours for full asset reclamation). An implementation must combine managerial actions (notification, asset recovery) with technical actions (deprovision accounts, revoke tokens, rotate secrets). Your training should make these steps routine and measurable.

Concrete steps managers must take

Managers are the trigger for offboarding actions: they must immediately notify HR and IT via a standard channel (ticketing system, PagerDuty, or a dedicated offboarding webhook). Train managers to: 1) file a pre-populated offboarding ticket with employee name, last day/time, list of known systems and shared resources; 2) collect physical assets (laptop, USB devices, badge) or coordinate a courier; 3) report known third-party accesses (GitHub, cloud console, SaaS apps); and 4) confirm return of CUI (paper files, removable media). Example: a 12-person defense subcontractor uses a simple JIRA offboard form that auto-triggers an Okta deprovision workflow and an IT playbook email—train managers to use that form without exception.

Technical runbook for IT (automation + manual actions)

IT needs both an automated deprovision pipeline and a manual checklist for exceptions. Typical automated components: IdP deprovisioning (Okta/OneLogin/AD), SCIM provisioning for SaaS, MDM/Intune remote wipe, and EDR isolation. Manual or scripted actions include disabling AD/Azure/Google accounts, deleting cloud API keys, and rotating shared credentials. Example commands and calls you can include in runbooks: Set-ADUser -Identity "j.doe" -Enabled $false (Active Directory), Set-AzureADUser -ObjectId -AccountEnabled $false (Azure AD), gam update user jdoe suspended on true (Google Workspace/GAM), and API calls to Okta: POST /api/v1/users/{id}/lifecycle/deactivate with an API token. For AWS, remove programmatic access: aws iam delete-access-key --user-name jdoe --access-key-id AKIA..., and remove console login by disabling the login profile. For Intune-managed devices, call the Graph API to retire/wipe the device: POST /deviceManagement/managedDevices/{id}/wipe. Document these commands and test them regularly.</p>

Specific technical items to cover in training

Train staff on revoking secrets and credentials beyond just user accounts—this includes SSH keys, service account keys, API tokens, OAuth refresh tokens, and certificates. For SSH keys, check central key inventories and remove keys from authorized_keys or rotate host keys as needed. For certificates, revoke via your CA and update CRLs/OCSP. For shared credentials (password managers, vaults), rotate secrets immediately when an offboarded user previously had access. Include how to isolate a device via EDR (e.g., CrowdStrike/F-Secure) to prevent network exfiltration while you investigate and wipe the device. Small-business example: an engineer who leaves with git credentials — ensure your runbook instructs IT to revoke GitHub personal access tokens, rotate repo deploy keys, and rotate any CI/CD secrets used by that developer.

Logging, evidence and verification

Compliance requires proof. Train both managers and IT to record each step: ticket opens (timestamped), API call logs, screenshots of disabled accounts, returned asset receipts signed by HR, and output from scripts that list account status. Store this evidence in a secure, immutable case file (e.g., ticketing system with attachments + WORM storage). Define acceptance criteria: account disabled, tokens revoked, devices wiped/signed back, and evidence attached. Have HR sign off to close the offboarding case. Auditors will want to see the timeline and proof that CUI access was removed within the SLA.

Risk of not implementing immediate safeguards

Failing to promptly remove access increases the risk of data leakage, insider theft, and unauthorized use of cloud resources (which can also cause cost overruns). Real-world impacts include leaked technical drawings or source code, lateral movement into sensitive systems via unchanged shared credentials, and failed deliverables under DFARS clauses that can lead to contract penalties. For a small business supplier, a single missed deprovisioned account can result in lost contracts, reputational damage, and regulatory fines.

Compliance tips and best practices for training

Create role-based training: a 20–30 minute module for managers (how to trigger the offboard workflow and what to collect) and a 60–90 minute hands-on lab for IT (runbook exercises, API calls, and simulated offboards). Use tabletop exercises and monthly simulated offboards for random employees to validate the runbook and measure SLA compliance. Maintain a central inventory of CUI repositories and privileged accounts so managers can answer “where does this person have access?” quickly. Implement separation of duties for deprovisioning and evidence verification (e.g., IT performs deprovision, HR verifies return and closes the ticket).

Summary: To meet PS.L2-3.9.2 you must blend policy, people, and technical controls—train managers to trigger a standardized offboarding workflow immediately, train IT to execute an automated + manual runbook that disables accounts, revokes credentials, and secures or collects CUI-bearing assets, and keep auditable evidence of every action. For small businesses, start with a simple documented playbook, automate IdP/SaaS deprovisioning via SCIM/Okta/GAM, practice regularly with tabletop exercises, and enforce SLAs so CUI access is removed reliably and defensibly.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes