How to Implement ISO 27001 Annex A 6.5

Implementing ISO 27001 Annex A 6.5 is a vital exit management protocol requiring the immediate revocation of access rights and recovery of assets upon an employee’s departure or role change. This control eliminates “ghost user” risks and data leakage, providing the business benefit of secure offboarding and preserved intellectual property.

ISO 27001 Annex A Responsibilities after termination or change of employment Implementation Checklist

Use this implementation checklist to achieve compliance with ISO 27001 Annex A 6.5. This control requires a rigid, technically verified process to revoke access and recover assets immediately upon an employee’s departure or role change, eliminating the “ghost user” risks that automated dashboards frequently ignore.

1. Establish a Mandatory ‘Leaver Trigger’ Workflow

Control Requirement: Ensure security processes are initiated immediately upon notification of termination. Required Implementation Step: Implement an automated hook between your HR system (e.g., BambooHR, Workday) and your IT Service Management (ITSM) tool. The moment a termination date is entered in HR, a “Critical Offboarding” ticket must automatically generate for IT. Relying on an email from HR to IT is a single point of failure that leads to delayed revocations.

Minimum Requirement: Automated ticket generation for all leavers with timestamped audit trails.

2. Execute Timed Access Revocation

Control Requirement: Remove access rights upon termination. Required Implementation Step: Script the account disablement process. Use PowerShell or Python to simultaneously disable the Active Directory account, revoke M365/Google Workspace sessions, and invalidate active VPN certificates at a specific time (e.g., 17:00 on the final day). Do not delete the account immediately; disable it to retain audit logs.

Minimum Requirement: Logs proving account disablement occurred within 60 minutes of the employment contract ending.

3. Recover and Sanitise Physical Assets

Control Requirement: Retrieve all organisational equipment. Required Implementation Step: Maintain a serialised asset register. Physically verify the return of laptops, mobile phones, and security keys (YubiKeys). Upon return, immediately boot the device to verify it hasn’t been swapped, then execute a cryptographic wipe (e.g., NIST 800-88 Purge) before re-imaging.

Minimum Requirement: A signed “Asset Return Form” reconciled against the hardware inventory.

4. Revoke Physical Access Tokens

Control Requirement: Prevent physical re-entry to the premises. Required Implementation Step: Log into the physical access control system (PACS) and permanently deactivate the leaver’s ID badge/fob. If physical keys were issued, they must be returned or the locks changed. Do not toss the badge in a drawer; destroy it or reformat it immediately.

Minimum Requirement: System logs showing the specific date and time the access card was deactivated.

5. Rotate Shared Credentials

Control Requirement: Mitigate the risk of knowledge retention. Required Implementation Step: If the leaver was a SysAdmin or Developer who had access to shared root passwords, service account keys, or “break-glass” credentials, these secrets must be rotated immediately. Use a Secrets Manager to automate this rotation; if you rely on a spreadsheet, assume the leaver has a copy.

Minimum Requirement: Audit logs showing password rotation for shared accounts within 24 hours of a privileged user’s exit.

6. Enforce Post-Employment Confidentiality

Control Requirement: Remind the leaver of their ongoing legal obligations. Required Implementation Step: Conduct a formal Exit Interview where the leaver signs a “Post-Employment Declaration”. This document must explicitly reiterate the NDA, confirming they have returned all data and hold no copies of source code or client lists on personal devices.

Minimum Requirement: A signed declaration acknowledging ongoing confidentiality duties.

7. Securely Transfer Business Data

Control Requirement: Ensure business continuity without compromising privacy. Required Implementation Step: Before wiping the user’s endpoint or cloud drive, have the line manager identify business-critical data. Transfer these specific files to a shared repository. Do not simply grant the manager full access to the leaver’s email inbox, as this often violates employee privacy laws (GDPR).

Minimum Requirement: A documented data handover process that respects privacy boundaries.

8. Cleanse Public Facings and Distribution Lists

Control Requirement: Prevent social engineering and communication errors. Required Implementation Step: Remove the leaver from the company website “Team” page and external client distribution lists immediately. Attackers often use the names of recently departed staff (who still appear on the website) to launch social engineering attacks against the finance team.

Minimum Requirement: Verification that the leaver’s profile is removed from public domains and internal email groups.

9. Notify External Partners

Control Requirement: Inform third parties that the individual no longer represents the company. Required Implementation Step: Identify if the leaver was the primary point of contact for key suppliers or clients. Proactively email these partners to state: “X is no longer with the business; please direct future correspondence to Y.” This prevents the leaver from “poaching” clients or authorising fraudulent orders.

Minimum Requirement: Communication records notifying key external stakeholders of the role change.

10. Conduct a Post-Exit Access Audit

Control Requirement: Verify that the offboarding process was successful. Required Implementation Step: 7 days after the exit, a Security Analyst must run a “Ghost User” report. Check AD, SaaS portals, and VPN logs to ensure zero activity and zero active accounts remain for that identity. This is the safety net for human error.

Minimum Requirement: A “Clean Sheet” audit report generated one week post-exit confirming no lingering access.

ISO 27001 Annex A 6.5 SaaS / GRC Platform Implementation Failure Checklist

Control RequirementThe ‘Checkbox Compliance’ TrapThe Reality Check
Access RevocationClicking “Offboard” in the GRC tool.The GRC tool updates its own list, but did it log into AWS and delete the IAM user? Unlikely. The user still has access.
Asset RecoveryMarking “Laptop Returned” in a spreadsheet.Did you power it on? Did you check the serial number? Leavers often return older, broken personal laptops and keep the company Mac.
Shared SecretsIgnoring this because “we have a policy”.If the leaver knows the Wi-Fi password and it hasn’t changed, they can park outside and access your network.
MFA TokensDisabling the password but forgetting the MFA token.If the session token is still valid (cached), the user can access O365/Slack for weeks without re-authenticating. You must revoke sessions.
Data TheftAssuming “they signed the NDA”.They signed it, but they also downloaded the client database to a USB drive 10 minutes before leaving. Check the DLP logs.
Shadow ITRevoking corporate SSO only.The leaver created a Trello board with their personal email for “work”. They still own that data. SSO revocation misses this.
Legal ClosureNo exit interview because “it was an amicable split”.Amicable splits turn sour. Without a signed exit declaration, your legal standing to reclaim IP is significantly weaker.
Fay Barker - High Table - ISO27001 Director

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top