The Hidden Cost of Manual Offboarding
Every IT team has "the process." A checklist, a ticket, maybe a shared spreadsheet. When someone leaves, HR files the offboarding request, IT revokes access, and everyone moves on.
Except they don't. The tickets slip through. The revocations get delayed. And the security team never actually verifies it happened.
The result: a ticking time bomb of orphaned credentials that most organizations don't even know they have.
The Offboarding Gap Nobody Talks About
The typical enterprise has around 80 to 100 applications per employee. Email, cloud storage, CRM, project management, development tools, analytics platforms, legacy systems nobody remembers provisioning. When someone leaves, the question isn't whether access gets revoked — it's when, and whether it was actually everything.
According to a 2024 Osterman Research study, 56% of organizations admitted to having former employee accounts still active more than 30 days after departure. Twenty percent admitted the timeframe was "indefinite."
These aren't negligence cases. They're process failures.
- HR submits the ticket, but the offboarding request hits the wrong queue
- IT revokes SSO access but forgets the service-specific admin account
- A contractor's access was never formally tracked in the first place
- Someone shared credentials with a colleague "temporarily" and never revoked them
- A team lead created a shared service account and nobody knows the password
Each failure is a small risk. Collectively, they create a persistent attack surface that grows with every departure.
The True Cost Goes Beyond Security
The obvious cost is breach risk. A former employee with active credentials is an easy target for data theft, malicious deletion, or credential resale on dark web marketplaces.
But the other costs are quieter:
Compliance findings. SOC 2, ISO 27001, and HIPAA all require defined access termination procedures — and evidence that they executed. When auditors request offboarding logs, most organizations scramble to produce partial screenshots and outdated tickets.
License waste. Every active seat on Salesforce, Atlassian, AWS, Microsoft 365, and every other SaaS is money leaving the org. Organizations routinely pay for seats held by people who left months ago.
Productivity traps. Ex-employee accounts creating noise in Slack, blocking workflows in project management tools, or receiving notifications that nobody processes. It adds up to confusion and wasted context-switching for the people left behind.
Legal exposure. In regulated industries, an ex-employee's continued access to customer data is a liability. Even if nothing malicious happens, the existence of that access is a compliance violation.
What "Good" Looks Like
Manual offboarding can't solve this. Human processes break under scale, and they have no audit trail. The answer isn't a better checklist — it's autonomous access governance.
Here's what the modern approach looks like:
Trigger-based revocation. When HR systems mark an employee as terminated, automated policies should immediately:
- Revoke SSO sessions across all connected applications
- Disable accounts in identity providers
- Trigger deprovisioning workflows for role-specific tools
- Archive or transfer owned data assets
Verification loops. Manual processes assume completion. Autonomous governance verifies it — checking within 24, 48, and 72 hours that each revocation actually took, flagging any failures for immediate attention.
Credential inventory. Before you can revoke, you need to know what exists. Autonomous discovery continuously builds an access graph — linking human identities to every credential, service account, API key, and OAuth token they've ever been issued.
Post-offboarding audit. A week, a month, and 90 days after departure, automated scans should confirm that:
- No new access was granted to the departing identity
- No residual credentials remain active
- No shared accounts or service accounts were created using the departing identity's context
The Vigil Approach
Vigil treats offboarding as a continuous governance problem, not a one-time event. Our system integrates with HR systems and identity providers to trigger automated revocation workflows the moment employment ends.
But we go further:
Access graph analysis — Before revocation, Vigil maps every credential the departing employee has ever touched. This means revoking not just their primary account, but any service accounts, shared credentials, or API keys tied to their identity.
Coverage verification — After offboarding, Vigil continuously monitors for credential re-activation or new access grants to the former employee's identity — catching the cases where someone re-enables an account "temporarily" or creates a new one using the same email.
Compliance evidence — Every revocation action, verification check, and post-departure scan generates documented evidence. When auditors ask "how do you know access was terminated," the answer is a complete timestamped record.
The goal isn't to add more steps to the offboarding process. It's to make the process invisible — automatic, verified, and auditable — so your team can focus on their actual work instead of playing access whack-a-mole.
Related Reading
Offboarding is one source of orphaned credentials — but it's not the only one. AI agents are accumulating access with zero governance oversight, and most security teams haven't caught up. Why AI Agents Need Access Governance covers what happens when LLMs get production access and nobody audits what they actually use.
Curious what lingering access your organization actually has? Book a demo to see what's hiding in your access graph.
See it in action
Vigil's live dashboard shows real access flags across a 10-user org — right now.