Generate a customized security checklist based on the departing employee role, access level, and your tech stack.
Select all systems and access this employee currently has.
0% complete