🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Use Checklists and Templates to Achieve Compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-9-1: Pre-Employment, During Employment and Post-Separation Requirements

Practical checklist and template-driven guidance to meet ECC – 2 : 2024 Control 1-9-1 requirements for pre-employment screening, during-employment controls, and secure post-separation handling.

March 28, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Control 1-9-1 of the Essential Cybersecurity Controls (ECC – 2 : 2024) requires organizations to manage personnel lifecycle security across pre-employment, during employment, and post-separation phases; using well-designed checklists and templates is the fastest, most auditable route to consistent compliance for the Compliance Framework practice this control addresses.

Why checklists and templates matter for Compliance Framework

The Compliance Framework emphasizes repeatability and evidence-based controls. Checklists enforce consistent steps (for example: background checks, role-based access provisioning, and exit revocation), and templates standardize documentation so audits can verify that requirements were applied uniformly. For small businesses with limited security staff, templates reduce decision friction and provide defensible, demonstrable controls during inspections or incident investigations.

Core components to include in your checklists and templates

Design templates that map directly to the Control 1-9-1 objectives: personnel screening, least privilege provisioning and periodic review, and timely deprovisioning on separation. Each template should capture the "who, what, when, why, and evidence" — e.g., requester identity, approved role, list of systems provisioned, provisioning timestamp, manager approval, and proof of exit processing.

Example checklist items (pre-employment)

Create a Pre-Employment Screening Checklist with fields and pass/fail items: candidate name, role, start date, HR background check completed (date & reference), identity verification completed (ID type and copy retained), employment eligibility confirmed, confidentiality/non-disclosure agreement signed, required training scheduled (security awareness, data handling), and cleared access level (none/standard/elevated).

Example templates (during employment)

Onboarding / Access Provisioning Template: include template fields for role-based access matrix mapping (role -> minimum required systems), account names created, group memberships, MFA enabled (Y/N), device enrollment (MDM/Intune), and scheduled entitlement review cadence. Entitlement Review Template should list each user, current access rights, owner/manager sign-off, date reviewed, and actions (retain, modify, revoke).

Implementation steps specific to the Compliance Framework

1) Map your internal roles to an approved Role-Based Access Control (RBAC) matrix aligned to Compliance Framework guidance. 2) Develop the three core templates: Pre-Employment Screening, Onboarding/Provisioning, and Offboarding/Deprovisioning. 3) Embed templates in your HRIS/IAM workflows so that HR and IT are coordinated — e.g., integrate Workday/ADP with Okta/Active Directory via SCIM or API connectors. 4) Automate where possible: trigger account creation only after HR field "background_check: passed" is true; trigger account disable when HR sets "termination_date".

Technical details and automation examples

For small businesses: use readily available tools to automate checklist enforcement. Example setup: HR system (Workday or a spreadsheet for microbusinesses) -> webhook to an automation platform (Zapier/Make/Azure Logic Apps) -> calls to your IAM (Okta/OneLogin) with SCIM to provision accounts and assign groups. For deprovisioning, implement an automated script (PowerShell for Active Directory or Okta API calls) that runs on a scheduled job and disables accounts where termination_date <= today, then logs the action to a SIEM (or even a simple centralized audit log) for evidence.

Real-world small business scenarios

Scenario A — 25-person software shop: adopt a simple Google Sheet as the canonical employee registry with columns that match your templates. Use a scheduled script to read new hires and send a provisioning request to IT. Script enforces MFA enablement and device enrollment before granting production repo access. Scenario B — 50-person consultancy: integrate HRIS to Okta via SCIM so that when HR updates a termination field, Okta disables access within 30 minutes and triggers a runbook that collects exit artifacts (laptop return, token surrender).

Risks of not implementing Control 1-9-1 and how checklists mitigate them

Without disciplined pre-employment screening and lifecycle controls, organizations face elevated insider threat risk, unauthorized access after separation, regulatory fines for poor access control evidence, and potentially sizable data breaches. Checklists reduce human error (e.g., forgetting to revoke privileges), and templates ensure that important artifacts (background check references, signed NDAs, deprovisioning logs) exist to demonstrate due diligence to auditors and investigators.

Compliance tips and best practices

- Set measurable SLAs: target account disablement within 4 hours for involuntary separations and within 24 hours for planned separations, and document SLA adherence in your deprovisioning checklist. - Require manager approval as an auditable step in provisioning templates. - Keep minimal privileged accounts and require step-up authentication for sensitive systems. - Use periodic (quarterly or semi-annual) entitlement reviews driven by your Entitlement Review Template; retain signed records for the retention period required by the Compliance Framework. - Log all template-driven actions to an immutable store (append-only log or SIEM) for audit trails.

Summary: To meet ECC – 2 : 2024 Control 1-9-1 within the Compliance Framework, build and enforce clear checklists and templates for pre-employment screening, in-employment access management, and post-separation deprovisioning; integrate those templates into HR and IAM workflows, automate where feasible, measure SLA performance, and retain auditable evidence — doing so will reduce risk, simplify audits, and make compliance repeatable even for small teams.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes