Fired an Employee? Here's What Most Companies Forget to Revoke | Lorikeet Security Skip to main content
Back to Blog

Fired an Employee? Here's What Most Companies Forget to Revoke

Lorikeet Security Team February 10, 2026 4 min read

An employee leaves your company. Maybe it was amicable, maybe it wasn't. Either way, IT gets the ticket: disable the account. Someone clicks the button in Active Directory or Google Workspace, the account goes dark, and everyone moves on.

Except the problem is far from solved.

Disabling an AD or Google account is step one. It is not the finish line. And treating it like the finish line is one of the most common security gaps we find during access reviews.

The Scope of the Problem

Think about how many systems a single employee touches over the course of their tenure. It is not just email and a laptop. A typical knowledge worker at a mid-sized company interacts with 20 to 50+ distinct systems, services, and platforms during their employment.

Some of those systems federate authentication through your identity provider. When the AD account dies, access to those systems dies with it. Good. But many others do not. They have their own credentials, their own tokens, their own keys. And those survive long after the employee has turned in their badge.

The uncomfortable truth: Most organizations have no centralized inventory of every system an employee has accessed. Without that inventory, your offboarding process is a best-guess exercise at best and a security liability at worst.

What Gets Forgotten

Here is the access that most companies miss when an employee departs. Every single one of these is something we have found still active during real-world access reviews.

SSH Keys on Servers

Developers and sysadmins add their public keys to authorized_keys files on production servers, jump boxes, and bastion hosts. These keys almost never get rotated during offboarding. The former employee can still SSH directly into your infrastructure from their personal machine, completely bypassing your identity provider.

API Tokens and Service Account Credentials

Engineers create API tokens for integrations, automation scripts, and internal tooling. These tokens are often long-lived, stored in config files or environment variables, and tied to the individual rather than a service account. When the person leaves, the tokens keep working. Indefinitely.

Personal Access Tokens on Code Platforms

GitHub, GitLab, and Bitbucket personal access tokens grant read and write access to your repositories. Disabling the user's SSO session does not invalidate existing PATs in many configurations. A former developer could still clone your proprietary codebase, push malicious commits, or access private repos weeks after termination.

SaaS Application Access

Slack, Notion, Figma, AWS Console, Jira, Confluence, Datadog, Sentry, HubSpot, Salesforce. The list goes on. Any SaaS platform where the employee created a direct login with a password, rather than going through SSO, will continue to work. Some of these platforms contain customer data, financial records, or infrastructure credentials.

Shared Passwords in Password Managers

If your team shares credentials through a password manager, the departed employee likely has those passwords memorized or backed up. Shared WiFi passwords, service account credentials, admin panels, vendor portals. All of it. Removing their vault access does not erase what they already know.

VPN Certificates and Configs

VPN client certificates, WireGuard configs, and OpenVPN profiles may still be sitting on the former employee's personal device. If your VPN authenticates based on certificates rather than (or in addition to) AD credentials, revoking the AD account does not kill VPN access. They can still tunnel into your corporate network.

CI/CD Pipeline Access

GitHub Actions secrets, Jenkins credentials, CircleCI environment variables, deployment keys. CI/CD systems are loaded with sensitive credentials. If the former employee had admin access to these pipelines, they may have had visibility into production database passwords, API keys to third-party services, and cloud provider credentials. Even if their access is revoked, those secrets may need to be rotated.

Personal Devices Enrolled in MDM

BYOD policies mean personal phones and tablets are often enrolled in your MDM solution with access to corporate email, internal apps, and company data. Disabling the AD account may or may not trigger an MDM wipe, depending on your configuration. You need to verify this explicitly for every departure.

Email Forwarding Rules

A disgruntled employee can set up a forwarding rule on their mailbox before they leave, sending a copy of every incoming email to a personal address. If you disable their account but do not check for forwarding rules first, sensitive communications may continue leaking to an external address. This is especially common in contentious terminations.

MFA Tokens and Backup Codes

If the employee enrolled a personal authenticator app or saved backup codes, those might still work for services that do not strictly tie MFA to the disabled identity provider account. Hardware security keys issued by the company need to be collected. TOTP seeds registered on personal devices need to be deregistered from each individual service.

Why This Matters More Than You Think

In amicable departures, residual access is a compliance issue. In contentious terminations, it is an active threat vector.

Consider the scenario: An engineer is let go during layoffs. They are upset. They still have a valid SSH key on three production servers, a GitHub PAT with write access to your main repository, and AWS credentials cached in their terminal. None of these were revoked because your offboarding checklist only covers AD and laptop collection.

This is not hypothetical. Insider threat incidents involving former employees make headlines regularly. In many cases, the access used in the attack was access that should have been revoked on day one but simply was not on anyone's list.

The risk compounds over time. Every employee who left without a thorough access review adds another layer of unmanaged credentials to your environment. After a few years of turnover, you may have dozens of former employees with some residual access to your systems, and no way to know which ones without a comprehensive audit.

What a Proper Access Review Looks Like

A real offboarding access review goes far beyond the AD disable button. It requires a systematic approach that covers every category of access an employee may have touched.

Complete Offboarding Access Checklist

Identity provider accounts:Disable in AD, Azure AD, Google Workspace, Okta, or whatever IdP you use. Verify SSO sessions are terminated across all federated applications.
Email:Check for and remove forwarding rules, delegates, and shared mailbox access before disabling. Convert to a shared mailbox if needed for business continuity.
SSH keys:Audit all servers for the employee's public keys in authorized_keys files. Remove them. Consider rotating host keys if the employee had root access.
Code repositories:Revoke GitHub/GitLab/Bitbucket access. Invalidate all personal access tokens. Rotate any deploy keys they had access to. Review recent commits for anything suspicious.
API tokens and service accounts:Identify and rotate every API key, token, or service account credential the employee created or had access to.
SaaS applications:Deprovision from every SaaS tool individually, not just the ones that use SSO. Check for local accounts on each platform.
Cloud provider access:Remove IAM users, revoke access keys, and review CloudTrail or equivalent logs for any access that occurred after the termination decision.
VPN and network access:Revoke VPN certificates. Remove WireGuard/OpenVPN configs. Update any shared network credentials. Check firewall rules for any exceptions tied to the user.
CI/CD pipelines:Remove access to Jenkins, GitHub Actions, CircleCI, etc. Rotate any secrets the employee could have viewed through pipeline configurations.
Password managers:Remove from shared vaults. Rotate all shared credentials the employee had access to. Yes, all of them.
MDM and devices:Initiate remote wipe on corporate devices. Unenroll personal devices from MDM. Verify corporate data has been removed from BYOD devices.
MFA and authentication:Deregister MFA tokens. Invalidate backup codes. Collect any company-issued hardware keys (YubiKeys, etc.).
Physical access:Deactivate badge access. Change door codes or shared entry codes. Collect physical keys. Update visitor logs and parking access.

Building a Sustainable Process

Having a checklist is a start, but it only works if someone actually follows it every time. The most resilient organizations we work with do three things well:

  1. Maintain a living access inventory. Every time a new tool, server, or service is provisioned, it goes on the list. Every time an employee is granted access to a new system, it is recorded. This turns offboarding from detective work into a straightforward deprovisioning exercise.
  2. Conduct periodic access reviews. Do not wait for someone to leave to discover what they have access to. Quarterly access reviews catch orphaned accounts, excessive permissions, and forgotten service accounts before they become a problem.
  3. Treat offboarding like an incident. Especially for contentious terminations, the offboarding process should be time-boxed and thorough. Access should be revoked within hours, not days. Logs should be reviewed. And someone should verify that every item on the checklist was actually completed.

If you are not sure whether your offboarding process covers all of these areas, or if you suspect there are former employees with residual access in your environment, an independent access review can give you a clear picture of where you stand and what needs to be fixed.

Not Sure What Former Employees Still Have Access To?

Our access review service maps every credential, token, and permission in your environment and identifies exactly what should have been revoked but was not.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!