What is deprovisioning ? | Definition from TechTarget (2024)

What is deprovisioning ? | Definition from TechTarget (1)

By

What is deprovisioning?

Deprovisioning is the part of the employee lifecycle in which access rights to software and network services are taken away.

Deprovisioning typically occurs when an employee leaves a company or changes roles within an organization. It is the opposite of provisioning, the part of the employee lifecycle in which employees are provided access rights to software and IT services. Provisioning occurs as part of the onboarding process. Deprovisioning occurs during the offboarding process.

During offboarding, deprovisioning removes individual accounts on file servers, single machines and authentication servers, such as Microsoft Active Directory.

Why is deprovisioning important?

In addition to preventing former employees from accessing corporate resources, deprovisioning also frees up disk space, ports, certificates and company-issued computers for future use.

Organizations should audit and keep track of information during the deprovisioning process, including information such as who authorized the deprovisioning, the date deprovisioning occurred and what actions were taken. For compliance reasons, some organizations save deprovisioned accounts for a short period of time in case they need to restore credentials, files or workflows during an audit.

Organizations need to properly conduct deprovisioning whenever an employee leaves or changes positions to ensure data remains safe. A Beyond Identity survey found that 56% of employees who retained digital access said they used it to harm their former employer.

This was last updated in April 2023

Continue Reading About deprovisioning

Related Terms

What is identity threat detection and response (ITDR)?
Identity threat detection and response (ITDR) is a collection of tools and best practices aimed at defending against cyberattacks...Seecompletedefinition
What is LDAP (Lightweight Directory Access Protocol)?
LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and ...Seecompletedefinition
What is passive keyless entry (PKE)?
Passive keyless entry (PKE) is an automotive security system that operates automatically when the user is in proximity to the ...Seecompletedefinition

Dig Deeper on Identity and access management

What is deprovisioning ? | Definition from TechTarget (2024)
Top Articles
14-year-old US artist earned over $ 1 million from NFT in 10 hours
Why are NFTs So Valuable if I Can Just Take a Screenshot? | Momint
Umbc Baseball Camp
It may surround a charged particle Crossword Clue
Puretalkusa.com/Amac
Acts 16 Nkjv
Achivr Visb Verizon
Craigslist Labor Gigs Albuquerque
Jessica Renee Johnson Update 2023
What Was D-Day Weegy
The Banshees Of Inisherin Showtimes Near Regal Thornton Place
Jesus Calling Oct 27
I Touch and Day Spa II
Fool’s Paradise movie review (2023) | Roger Ebert
[Birthday Column] Celebrating Sarada's Birthday on 3/31! Looking Back on the Successor to the Uchiha Legacy Who Dreams of Becoming Hokage! | NARUTO OFFICIAL SITE (NARUTO & BORUTO)
Check From Po Box 1111 Charlotte Nc 28201
Epro Warrant Search
Sni 35 Wiring Diagram
Lehmann's Power Equipment
Apply for a credit card
Lawson Uhs
Account Suspended
Johnnie Walker Double Black Costco
Why do rebates take so long to process?
Yog-Sothoth
Yosemite Sam Hood Ornament
Watch Your Lie in April English Sub/Dub online Free on HiAnime.to
Loslaten met de Sedona methode
Southland Goldendoodles
Aspenx2 Newburyport
Fiona Shaw on Ireland: ‘It is one of the most successful countries in the world. It wasn’t when I left it’
Copper Pint Chaska
Federal Express Drop Off Center Near Me
FREE Houses! All You Have to Do Is Move Them. - CIRCA Old Houses
Why Are The French So Google Feud Answers
Pch Sunken Treasures
Weekly Math Review Q4 3
Goodwill Thrift Store & Donation Center Marietta Photos
Louisville Volleyball Team Leaks
Petsmart Northridge Photos
Aliciabibs
Doe Infohub
How to Install JDownloader 2 on Your Synology NAS
John Wick: Kapitel 4 (2023)
Sandra Sancc
Neil Young - Sugar Mountain (2008) - MusicMeter.nl
Windy Bee Favor
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
300 Fort Monroe Industrial Parkway Monroeville Oh
Minecraft Enchantment Calculator - calculattor.com
Subdomain Finer
Latest Posts
Article information

Author: Kimberely Baumbach CPA

Last Updated:

Views: 5790

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Kimberely Baumbach CPA

Birthday: 1996-01-14

Address: 8381 Boyce Course, Imeldachester, ND 74681

Phone: +3571286597580

Job: Product Banking Analyst

Hobby: Cosplaying, Inline skating, Amateur radio, Baton twirling, Mountaineering, Flying, Archery

Introduction: My name is Kimberely Baumbach CPA, I am a gorgeous, bright, charming, encouraging, zealous, lively, good person who loves writing and wants to share my knowledge and understanding with you.