The Hidden Cost of Employee Churn: Why Offboarding Is a Security Event
When an employee leaves, the HR process ends but the security risk does not. Credentials persist, API keys outlast employment contracts, and the average stolen credential sits idle for 41 days before being used.

When an employee leaves, the HR process ends. The security risk does not. Credentials persist in systems. API keys outlast employment contracts. And the average stolen credential sits idle for 41 days before being used, more than enough time for a disgruntled ex-employee's access, or a credential leaked from their personal devices, to become your incident.
Most companies have an offboarding checklist. It covers the laptop return, the access card, the final payroll run, and the exit interview. What it almost never covers adequately is the digital access that persists after every other offboarding step is complete.
This is not a criticism. Digital access is sprawling, hard to map, and easy to overlook, particularly as the average employee at a growing company accumulates access to dozens of SaaS tools, several cloud environments, a variety of APIs, and possibly a handful of personal devices with cached corporate credentials. When that employee leaves, HR handles what HR can see. What HR cannot see is the API key the developer hardcoded into a script three months ago, the Slack workspace invitation that grants them access to client conversations, or the personal laptop that has their corporate SSO session cached and never officially provisioned.
The Three Access Categories That Survive Offboarding
1. Direct System Access That Was Never Revoked
The most obvious category, and the one most offboarding processes still miss in practice. A study by BeyondTrust found that 52% of organisations had experienced a security incident caused by a former employee retaining access to IT systems after departure. The most common reasons:
- The employee's manager forgot to notify IT about the departure in time
- IT revoked access to known systems but was unaware of additional access provisioned by the employee themselves (shadow IT)
- Access was revoked from the primary identity provider but not from every integrated application (SaaS tools that authenticate via OAuth and cache tokens)
- Service accounts and shared credentials (team logins for social media, marketing platforms, analytics tools) were not changed because the team did not know the departing employee had access
2. Credentials That Live Outside Your Systems
This category is less obvious and significantly more dangerous. An employee who has worked for your company for two years has likely used their corporate email address to create accounts on dozens of external services: developer tools, professional communities, conference registrations, and more. If any of those external services are breached, the employee's email address and password appear in the breach dataset, along with every other victim.
If that employee was using the same password across their corporate login and their personal accounts (common, despite every training programme you have ever run), their corporate credentials are now in a breach dataset. The employee has left. Your IT team revoked their corporate account. But the credential in the breach dataset does not know that, and an attacker who tries that email/password combination against your VPN, your admin panel, or your cloud environment will discover that the account no longer works. Unless the password was already reused to set up a second account you did not know about. Or unless there is a cached session token somewhere that predates the account termination.
The 41-day window: The average time between when a credential is stolen and when it is used in an attack is 41 days (IBM, 2025). For a credential leaked from a former employee's personal device or a third-party breach, this window starts ticking on the day the breach occurs, not the day the employee left. You may be entirely unaware that the credential is circulating until a login attempt surfaces it.
3. API Keys, Tokens, and Hardcoded Secrets
This is the category that consistently catches technical teams by surprise. Developers, DevOps engineers, and system administrators routinely create API keys, service account credentials, and access tokens in the course of their work. These may be:
- Hardcoded into scripts or infrastructure-as-code repositories (including public GitHub repositories)
- Saved in developer tools, local configuration files, or CI/CD pipeline secrets
- Stored in third-party services the developer used (cloud IDE sessions, automation platforms, developer tools)
- Shared via Slack messages, emails, or internal wikis that outlast the individual's employment
When a developer leaves, their API keys do not automatically expire. They continue to grant whatever access they were provisioned for, often to production systems, data stores, or external services, until someone explicitly revokes them. In practice, the keys that are most dangerous are often the ones nobody remembers creating.
The Risk Profile of Credential Persistence by Employee Type
| Employee type | Typical access retained | Risk level |
|---|---|---|
| Developer / Engineer | API keys, cloud IAM roles, database credentials, CI/CD secrets, code repositories | Very High |
| Sales / Account Manager | CRM access, client communication platforms, shared email aliases, sales tool integrations | High |
| Finance / Accounting | Payment platforms, banking portals, expense systems, ERP/accounting software | High |
| Marketing | Social media accounts, marketing platforms, analytics tools, brand asset libraries | Medium-High |
| Contractor / Freelancer | Project-specific access that was provisioned informally and never formally tracked | Very High |
A Practical Offboarding Security Checklist
Security Offboarding Checklist, By Day
- D0, Disable primary identity provider account, Google Workspace, Microsoft 365, or Okta. This should cascade to any SSO-integrated applications automatically. (Day of departure)
- D0, Revoke active sessions and tokens, Force sign-out of all active sessions in your identity provider. This invalidates cached sessions even on devices you do not control. (Day of departure)
- D0, Change shared passwords the employee knew, Social media accounts, shared admin logins, team email aliases. Ask their manager what shared credentials they had access to. (Day of departure)
- D3, Audit OAuth-connected applications, Check which third-party apps are connected to the employee's now-disabled account. Revoke any OAuth tokens for applications that should not retain access. (Within 3 days)
- D7, Review and rotate API keys attributed to the employee, Particularly for developers and engineers. Check code repositories, CI/CD pipelines, and cloud IAM for keys associated with their identity. (Within 1 week)
- D7, Notify third-party vendors of access change, Any vendor that had provisioned access for that specific employee (not just system-level access) should be notified and the access revoked at their end too. (Within 1 week)
- D30, Check dark web for the ex-employee's corporate email, Their email address may appear in a breach dataset before or after departure. If it does, rotate any systems where that password may have been reused. (Within 30 days)
- D30, Review public code repositories for secrets, Check GitHub, GitLab, or Bitbucket for any code committed by the employee that contains hardcoded credentials, API keys, or connection strings. (Within 30 days)
The Dark Web Monitoring Gap
The most difficult category to manage manually is the ongoing exposure of former employee credentials in dark web datasets. A credential from an employee who left 18 months ago can appear in a new breach dump today, from a breach of a service they used while employed, which was only discovered and disclosed now. Your offboarding checklist ran 18 months ago. Nothing in it anticipated this breach.
This is where ongoing dark web monitoring provides value that no manual offboarding process can replicate. By continuously monitoring for email addresses associated with your domain, including those of former employees, whose addresses often persist in external systems and breach datasets long after they leave, you create a detection capability that does not depend on knowing in advance which credentials will be compromised.
Scenario, The Developer Who Left 14 Months Ago: A senior developer leaves a SaaS company. IT completes the standard offboarding: primary account disabled, laptop wiped, access revoked. Fourteen months later, a data broker marketplace lists 200,000 credentials from a popular developer tool. Among them: the former developer's corporate email and a password. The developer had used that password, with minor variations, across multiple tools during their tenure. One of those tools was a staging environment credential that was never rotated. It still works. Dark web monitoring that flags ex-employee email addresses in breach datasets surfaces this within hours of the dump appearing, not 14 months later when someone tries the credential.
The Vendor Access Dimension
A frequently overlooked dimension of offboarding security is vendor access. When an employee manages vendor relationships, they are often the named contact with privileged access to vendor portals, supply chain systems, or third-party platforms. When they leave, their vendor access may persist independently of your internal identity provider, because vendor portals often have their own user management, separate from your SSO.
As part of any senior departure, notify key vendors that the individual's access should be transferred or revoked. This applies particularly to: cloud platform reseller portals, payment processing platforms, marketing technology platforms with customer data access, and any vendor whose portal grants access to your customer data or production systems.
The Bottom Line
Employee departures are security events whether you treat them as such or not. The question is whether you manage the risk proactively, with a structured offboarding security process and ongoing monitoring for credential exposure, or reactively, when an incident investigation reveals that the access vector was a credential belonging to someone who left the company eight months ago.
The tools and processes to manage this risk are not complex. The organisations that handle it well have two things: a checklist that treats access revocation as a time-critical action (not a two-week administrative process), and a monitoring capability that catches the exposures that no checklist can anticipate.
Frequently Asked Questions
Why is employee offboarding a security risk?
Employee offboarding is a security risk because digital access persists far beyond the HR process. When someone leaves, their credentials may still work in SaaS tools authenticated via cached OAuth tokens, their API keys may be hardcoded into production scripts, and their corporate email address continues to appear in third-party breach datasets indefinitely. The average stolen credential takes 41 days to be used in an attack, meaning a former employee's compromised credentials can become an active threat weeks or months after departure.
What should a security-focused offboarding checklist include?
A security-focused offboarding checklist should cover five categories on a strict timeline: Day 0 actions (disable identity provider account, force sign-out of all active sessions, change shared passwords the employee knew), Day 3 actions (audit and revoke OAuth-connected applications), Day 7 actions (rotate API keys attributed to the employee, notify third-party vendors), and Day 30 actions (check dark web for the ex-employee's corporate email, review public code repositories for hardcoded secrets). The critical difference from a standard HR checklist is treating access revocation as a same-day security action, not a multi-week administrative task.
How long do former employee credentials remain active on average?
Research shows that 52% of organisations have experienced a security incident caused by a former employee retaining system access after departure. The most common causes are delayed notification to IT, shadow IT accounts unknown to the identity provider, cached OAuth tokens in SaaS tools that persist after primary account deactivation, and shared credentials that were never rotated. Dark web credential exposure adds another dimension: a former employee's email and password can appear in a new breach dump months or years after they leave, from a service they used during their tenure that was only recently compromised.
Ready to see Scrutex in action?
Sign up free or book a live demo. Most teams are up and running in under 10 minutes.