An employee leaves. You remove their badge access but forget to disable their network account. They still have access to customer data. Or they take files home. CUI protection during personnel transitions is critical. Offboarding must be deliberate. This practice follows PS.L2-3.9.1 (screening during hire) and connects to AC.L2-3.1.2 (access deprovisioning).
What the assessor is actually evaluating
The assessor is checking: (1) Do you have an offboarding process that covers access removal? (2) Do you follow it? (3) Can you show recent examples of employees who left and had access revoked? The control covers terminations, transfers, and role changes. Anyone losing access to CUI needs to have their access revoked and their devices cleaned of CUI.
The key phrase: “protect CUI during personnel actions.” This means both revoking future access and recovering any data they might retain.
What a realistic SSP definition looks like
When an employee is terminated, transferred, or changes roles affecting CUI access, the following actions are taken immediately:
- Network access is disabled in Active Directory
- Access badges and physical keys are revoked
- Corporate devices (laptop, phone) are recovered and wiped if CUI is present
- Email access is disabled
- VPN and any external service access is removed
- Employee receives a security reminder regarding CUI protection
Offboarding is documented in [HR system]. IT confirms access removal in [system log]. The employee signs acknowledgment of the security reminder.
For role changes, access is adjusted to remove CUI access no longer needed and add access required for the new role.
How to present your evidence
- Offboarding or separation checklist showing CUI-related steps
- Access revocation logs (recent examples of employees disabled in AD or systems)
- Security awareness reminder that covers CUI protection and non-retention
- Signed acknowledgments from departing employees
- Device recovery or wipe documentation for high-risk roles
- Role change examples showing access was adjusted appropriately
Keep answers short. Show the evidence, don't describe it. Let the assessor drive. For more on how to present in the assessment room, see How to Present Evidence in the Assessment Room.
Q: “Can you show me a recent example?" A: “[Employee] left in [month]. Here’s the HR notification, the access removal logs, and the signed acknowledgment.” [Show documentation]
Q: “What if someone has a laptop with CUI?" A: “We recover the device and wipe any CUI or sensitive data. For high-risk roles, we do this before their last day.”
Q: “How about someone transferring to a different role?" A: “Same process. We remove access they no longer need and grant access for the new role. Changes are documented.”
Short, practical breakdowns of what assessors actually ask and how to answer. No compliance jargon, no sales pitch. Subscribe free on Substack.
Common failures
Practical offboarding steps
Create a checklist or form that goes to IT when someone is being terminated:
- Disable AD account
- Revoke VPN access
- Revoke email access
- Revoke access to shared drives or systems
- Recover laptop, phone, badge, keys
- Wipe the device if CUI is present
- Employee signs security acknowledgment
Assign one person (IT manager, security, or HR) to ensure it’s done. Make a log showing dates and completion for each person.
For role changes, adjust access to remove what’s no longer needed and add what the new role requires.
If you use an MSP/MSSP
This guide reflects CMMC Level 2 requirements as of March 2026. CMMC and NIST standards evolve. Verify current requirements with official CMMC materials and your assessor.