Skip to main content
Home / Services / Access Reviews & Offboarding Audits

Access Reviews & Offboarding Audits

Verify terminated employees no longer have access to your systems

2-5 days Starting at $3,000
Access Reviews & Offboarding Audits ASSESSMENT
2
CRITICAL
6
HIGH
11
MEDIUM
5
LOW
External perimeter testingPASSED
Application security testingPASSED
Remediation verificationIN PROGRESS
Final report deliveryPENDING
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

When employees leave - especially those terminated under difficult circumstances - their access needs to be fully revoked across every system, SaaS tool, cloud account, and code repository. Our Access Review service audits your offboarding process and validates that former employees have zero residual access to your environment.

Our Process

What We Test & How

What We Test

We audit access across your entire technology stack: Active Directory and Entra ID accounts, email and collaboration tools (Google Workspace, Microsoft 365, Slack), cloud consoles (AWS, Azure, GCP), source code repositories (GitHub, GitLab, Bitbucket), SaaS applications, VPN and remote access, API keys and service accounts, SSH keys, CI/CD pipelines, and shared credential stores. We also review whether MFA was properly deprovisioned and whether any personal devices retained corporate access.

Our Approach

We work with your HR and IT teams to identify recently departed employees and contractors, then systematically verify that every access point has been revoked. We cross-reference identity providers with individual application access, check for orphaned accounts, review shared credentials that may need rotation, and validate that offboarding procedures are being followed consistently.

Deliverables

What You'll Receive

Everything included in your engagement report.

Complete access audit report per departed employee

Residual access findings with risk ratings

Orphaned and dormant account inventory

Shared credential rotation recommendations

Offboarding process gap analysis

SaaS and cloud access verification matrix

Policy and procedure improvement recommendations

Executive summary for leadership and compliance

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

Identity provider account status verification

2

Email and collaboration platform access audit

3

Cloud console and IAM access review

4

Source code repository access validation

5

SaaS application access enumeration

6

VPN, SSH, and remote access checks

7

API key and service account review

8

Offboarding process and policy assessment

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

Active Accounts After Termination Orphaned Service Accounts and API Keys Unrevoked SSH Keys and Certificates Retained Access to Source Code Repos Active SaaS Licenses for Former Staff Shared Passwords Not Rotated Post-Departure Personal Devices Still Enrolled in MDM Incomplete Offboarding Checklists
Who It's For

Ideal For

Companies After Layoffs or Restructuring
Organizations with High Employee Turnover
Businesses Handling Sensitive Data
Companies Preparing for Compliance Audits
Teams with Complex SaaS Environments
Organizations After Contentious Terminations
Compliance

Standards We Support

SOC 2 ISO 27001 NIST 800-53 HIPAA PCI-DSS GDPR

Ready to Get Started?

$3,000

Typical engagement: 2-5 days

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!