IAM Concepts

Offboarded Employee

Diagram representing a glossary term in Oasis Security, illustrating key concepts in non human identity management

What is an offboarded employee?

An offboarded employee refers to a former staff member whose employment has formally ended and whose user access to enterprise systems has been, or should be, revoked. In the context of identity and access management (IAM), offboarding typically involves deactivating user accounts, removing entitlements, and revoking device and application access. However, in modern cloud and DevOps environments, offboarding must also address non-human identities (NHIs)—such as service accounts, API keys, and machine credentials—that the former employee created, owned, or managed during their tenure.

Why is it important?

Failing to fully decommission both human and associated non-human identities during offboarding introduces significant security risk. Orphaned NHIs—those that remain active after a creator or owner departs—can serve as persistent, unmonitored backdoors into production systems. These identities often retain high privileges and lack visibility in traditional IAM tools, making them prime targets for exploitation. According to industry data, 68% of organizations have active machine credentials tied to offboarded personnel, with attacker dwell times exceeding 280 days due to inadequate credential lifecycle management.

What are common applications or use cases?

In practice, offboarding must extend beyond deactivating human accounts to include:

  • Credential rotation of API keys, cloud IAM users, and service accounts generated by the offboarded employee.
  • Automated policy enforcement to disable NHIs associated with terminated personnel via HRIS-triggered workflows.
  • Behavioral monitoring of remaining NHIs to detect post-offboarding anomalies, such as privilege escalation or lateral movement.
    For example, in the 2023 Cloudflare breach, attackers leveraged an orphaned NHI with elevated permissions left behind by a former engineer, bypassing human-centric controls entirely.

What is the connection to NHIs (Non-Human Identities)?

NHIs often outlive their human counterparts due to poor attribution and lack of automation in offboarding workflows. In DevOps environments, former employees may leave behind long-lived access tokens, hardcoded secrets in CI/CD pipelines, or overprivileged service accounts. Without centralized visibility and lifecycle enforcement, these machine identities remain active and unmonitored. Mapping NHIs back to their human owners is essential to ensuring their proper decommissioning during offboarding.

Are there any notable industry data, trends, or standards?

Yes. Studies show that NHIs proliferate up to 17 times faster than human identities, and 67% of service accounts lack documented ownership. Incidents such as SolarWinds and Dropbox demonstrate how improperly offboarded NHIs can lead to major breaches. Emerging best practices include integrating HR systems with NHI security platforms, adopting just-in-time access controls, and implementing zero-trust mechanisms for machine identities, such as SPIFFE/SPIRE and short-lived certificates.

What is the broader impact or takeaway?

As enterprise environments become more automated and distributed, the offboarding process must evolve to include machine identity governance. Organizations that implement NHI-aware offboarding pipelines—integrating HR, IAM, and DevOps systems—significantly reduce their attack surface, improve compliance posture, and accelerate breach containment. In a world where machine identities increasingly outnumber humans, offboarding must be redefined as a cross-domain lifecycle management process that secures both people and the digital constructs they leave behind.