2 cissp ® Official Study Guide Eighth Edition


Onboarding and Termination Processes



Download 19,3 Mb.
Pdf ko'rish
bet72/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   68   69   70   71   72   73   74   75   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Onboarding and Termination Processes
Onboarding
is the process of adding new employees to the identity and access management 
(IAM) system of an organization. The onboarding process is also used when an employee’s 
role or position changes or when that person is awarded additional levels of privilege or 
access.
Offboarding
is the reverse of this process. It is the removal of an employee’s identity 
from the IAM system once that person has left the organization. This can include dis-
abling and/or deleting the user account, revoking certificates, canceling access codes, and 
terminating other specifically granted privileges. This may also include informing security 
guards and other physical access management personnel to disallow entry into the building 
to the person in the future.
The procedures for onboarding and offboarding should be clearly documented in order 
to ensure consistency of application as well as compliance with regulations or contractual 
obligations.
Onboarding can also refer to organizational socialization. This is the process by which 
new employees are trained in order to be properly prepared for performing their job 
responsibilities. It can include training, job skill acquisition, and behavioral adaptation 
in an effort to integrate employees efficiently into existing organizational processes and 
procedures. Well-designed onboarding can result in higher levels of job satisfaction, higher 
levels of productivity, faster integration with existing workers, a rise in organizational loy-
alty, stress reduction, and a decreased occurrence of resignation. Another benefit of well-
designed onboarding, in the context of separation of duties and job responsibilities, is that 
it applies the principle of least privilege as previously discussed.
When an employee must be terminated or offboarded, numerous issues must be addressed. 
A strong relationship between the security department and human resources (HR) is essential 
to maintain control and minimize risks during termination. An employee termination pro-
cess or procedure policy is essential to maintaining a secure environment when a disgruntled 
employee must be removed from the organization. The reactions of terminated employees can 
range from calm, understanding acceptance to violent, destructive rage. A sensible procedure 
for handling terminations must be designed and implemented to reduce incidents.
The 
termination
of an employee should be handled in a private and respectful manner. 
However, this does not mean that precautions should not be taken. Terminations should 
take place with at least one witness, preferably a higher-level manager and/or a security 


58
Chapter 2 

Personnel Security and Risk Management Concepts
guard. Once the employee has been informed of their release, they should be escorted off 
the premises and not allowed to return to their work area without an escort for any reason. 
Before the employee is released, all organization-specific identification, access, or security 
badges as well as cards, keys, and access tokens should be collected (Figure 2.3). Generally, 
the best time to terminate an employee is at the end of their shift midweek. An early to mid-
week termination provides the ex-employee with time to file for unemployment and/or start 
looking for new employment before the weekend. Also, end-of-shift terminations allow the 
worker to leave with other employees in a more natural departure, thus reducing stress.
F I g u R e 2 . 3
Ex-employees must return all company property
access cards
employee photo ID
ex-employee
smart card
company tablet
company smart phone
The Company
keys
When possible, an 
exit interview
should be performed. However, this typically depends 
on the mental state of the employee upon release and numerous other factors. If an exit 
interview is unfeasible immediately upon termination, it should be conducted as soon as 
possible. The primary purpose of the exit interview is to review the liabilities and restric-
tions placed on the former employee based on the employment agreement, nondisclosure 
agreement, and any other security-related documentation.
The following list includes some other issues that should be handled as soon as possible:

Make sure the employee returns any organizational equipment or supplies from their 
vehicle or home.

Remove or disable the employee’s network user account.

Notify human resources to issue a final paycheck, pay any unused vacation time, and 
terminate benefit coverage.

Arrange for a member of the security department to accompany the released employee 
while they gather their personal belongings from the work area.

Inform all security personnel and anyone else who watches or monitors any entrance 
point to ensure that the ex-employee does not attempt to reenter the building without 
an escort.


Personnel Security Policies and Procedures 
59
In most cases, you should disable or remove an employee’s system access at the same 
time as or just before they are notified of being terminated. This is especially true if that 
employee is capable of accessing confidential data or has the expertise or access to alter 
or damage data or services. Failing to restrict released employees’ activities can leave your 
organization open to a wide range of vulnerabilities, including theft and destruction of 
both physical property and logical data.
Firing: not Just a Pink Slip anymore
Firing an employee has become a complex process. Gone are the days of firing merely 
by placing a pink slip in an employee’s mail slot. In most IT-centric organizations, 
termination can create a situation in which the employee could cause harm, putting the 
organization at risk. That’s why you need a well-designed exit interview process.
However, just having the process isn’t enough. It has to be followed correctly every time. 
Unfortunately, this doesn’t always happen. You might have heard of some fiasco caused 
by a botched termination procedure. Common examples include performing any of the 
following before the employee is officially informed of their termination (thus giving
the employee prior warning of their termination):

The information technology (IT) department requesting the return of a notebook computer

Disabling a network account

Blocking a person’s personal identification number (PIN) or smartcard for building 
entrance

Revoking a parking pass

Distributing a company reorganization chart

Positioning a new employee in the cubicle

Allowing layoff information to be leaked to the media
It should go without saying that in order for the exit interview and safe termination 
processes to function properly, they must be implemented in the correct order and at the 
correct time (that is, at the start of the exit interview), as in the following example:

Inform the person that they are relieved of their job.

Request the return of all access badges, keys, and company equipment.

Disable the person’s electronic access to all aspects of the organization.

Remind the person about the NDA obligations.

Escort the person off the premises.



Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   68   69   70   71   72   73   74   75   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish