Skip to content

Offboarding Process

Offboarding is initiated via the Employee Offboarding form in Linear Asks (IT Ops team). The form creates a Linear issue with a full deprovisioning checklist. The CTO suspends the Google Workspace account immediately (90-day retention, scheduled for full deletion), triggers the access-provision.yml workflow for automated deprovisioning (GitHub, Supabase, Doppler), and completes manual steps. Manual steps remain for 1Password, Slack, Cloudflare, CrowdStrike, Backblaze, and GCP IAM.

Workflow: The access-provision.yml workflow is triggered via workflow_dispatch from the Linear issue checklist for the 6 automated systems.

The Linear issue is the audit record. 90-day Google account deletion is tracked via the issue’s due date (set to 90 days from suspension), with the issue moved to Waiting state until deletion.

SLA: Access revoked within 24 hours of departure. Involuntary terminations: within 1 hour.


If the access-provision.yml workflow was used, automated deprovisioning has already handled GitHub, Supabase, and Doppler. Use the table below to verify automated steps completed and to complete the remaining manual systems (Google Workspace, 1Password, Slack, Cloudflare, CrowdStrike, Backblaze, GCP IAM).

#SystemActionResponsible
1GitHubRemove from Meridian7-io organizationCTO
2SupabaseRemove from organizationCTO
3DopplerRemove from workplaceCTO
#SystemActionResponsible
4Google WorkspaceSuspend account (do NOT delete — 90-day data retention). CTO suspends manually per Linear issue checklist.CTO
5GCP IAMRevoke all IAM role bindings (Cloud Run, Cloud Monitoring) via GCP Console → IAMCTO
6SlackDeactivate accountCTO
71PasswordSuspend account and remove from all vaultsCTO
8CloudflareRemove from account (if applicable)CTO
9CrowdStrikeRemove host from console (after device recovery)CTO
10BackblazeRevoke application keys associated with user (if applicable)CTO
11GitHub ProjectRemove from all boardsCTO
#ActionResponsible
14Identify all Doppler secrets the user had access toCISO
15Rotate identified secrets in Doppler (all affected environments)CTO
16Rotate any shared credentials the user had knowledge ofCTO
17Verify rotated credentials are deployed and services are healthyCTO
#ActionResponsible
18Verify CrowdStrike sensor removed from departing employee’s device (or initiate remote uninstall via Falcon Console)CTO
19Confirm employee signed out of all company accountsCTO
20Confirm employee removed company data from local storageCTO
21Remove device from CrowdStrike host inventoryCTO

doppler run -p m7-security -c prd -- python3 automation/scripts/runner.py --mode evidence --output-dir evidence
doppler run -p m7-security -c prd -- python3 automation/scripts/runner.py --mode verify

The verify runner confirms the departed user no longer appears in any system’s user list. Results are recorded in the Linear issue before it is moved to Done.



Meridian Seven — Confidential