When you stop using a vendor, the commercial relationship ends. But the API credentials, OAuth tokens, data access permissions, and webhook integrations often don't. Incomplete vendor offboarding is one of the most common unmanaged security risks in fast-growing companies — and one of the first things an auditor or penetration tester will find.
Why this happens
When you onboard a vendor, there's usually a project. Someone is leading the implementation, credentials are being created, integrations are being built, and access is being provisioned. It's a visible, active process that people are paying attention to.
Offboarding is the opposite. It happens at the end of a relationship, often when the company has moved on to something else, sometimes after the person who managed the original relationship has left. The cancellation email gets sent, the payment stops, and then — nothing. The access that was provisioned during onboarding just sits there, dormant but present.
The problem compounds over time. A company that's three years old and has been growing quickly has probably changed its vendor stack significantly. Tools get replaced, contracts get cancelled, integrations get deprecated. But the credentials and access permissions from those old relationships accumulate unless someone is actively cleaning them up. By the time a penetration test or audit surfaces the issue, there can be years' worth of stale vendor access sitting in your systems.
The security risks
API credentials and OAuth tokens granted during a vendor relationship typically remain valid after the relationship ends. A former vendor — or anyone who has obtained their credentials — retains access to your systems.
Vendors that handled your data during the relationship may still be retaining it after offboarding — in violation of your data processing agreement and potentially of data protection law. Without formal offboarding, you have no evidence that data deletion was requested or confirmed.
Webhooks that were set up to push data to a vendor's systems may continue firing after the relationship ends, sending your operational data to an endpoint you no longer control or monitor.
If a former vendor suffers a breach, attackers who find their way in may discover credentials for your systems that were never revoked. Your former vendor's breach becomes your current security incident.
These aren't theoretical risks. Supply chain attacks via compromised third-party credentials have become one of the most common attack vectors for sophisticated threat actors. The SolarWinds attack, the Kaseya incident, and numerous smaller-scale supply chain compromises all involved attackers gaining access via third-party relationships — in some cases, via former vendor relationships where access had not been properly revoked.
The compliance risks
Security risk is the obvious concern with poor vendor offboarding. But the compliance implications are equally significant — and are increasingly the focus of SOC 2, ISO 27001, and financial services audits.
SOC 2 CC9.2 — the vendor management control — includes requirements around how you terminate vendor relationships. Auditors are looking for evidence that when a vendor relationship ends, access is revoked systematically, data is handled per contractual terms, and the termination is documented in your vendor register. The key word is evidence: not a policy that says you do this, but documentation showing that it has been done for specific terminated relationships during the audit period.
ISO 27001:2022 A.5.19 explicitly covers the termination or change of supplier relationships. Auditors expect to see a documented offboarding process — what happens when a supplier relationship ends, who is responsible for revoking access, how data deletion is confirmed, and how the supplier register is updated. The 2022 revision places greater emphasis on this than the 2013 standard, and it's an area where audit findings have become more common.
Under GDPR, when you terminate a relationship with a data processor — a vendor that handles personal data on your behalf — you're required to ensure that your personal data is either returned or deleted, as specified in your data processing agreement. Without a systematic offboarding process, you have no evidence that this obligation has been met. In the event of a data subject access request or a regulatory inquiry, this gap becomes very visible.
“During our SOC 2 Type II audit, we were asked to demonstrate our vendor offboarding process and provide examples of recent offboardings. We had a policy document but no evidence of it being followed. The auditor found three former vendors with active API credentials in our production systems. It was a significant finding and added two months to our remediation timeline.”
What good looks like
A proper vendor offboarding process doesn't need to be bureaucratic. It needs to be systematic — a defined set of steps that happen every time a vendor relationship ends, with documentation that proves they happened. Here's what that looks like:
Where things go wrong
How Vendorapp handles it
Vendorapp is built around a core principle of offboarding documentation: when a vendor relationship ends, the vendor is paused — not deleted. The full history of the relationship, the assessments, the contract records, and the offboarding documentation are preserved indefinitely and are always accessible to auditors.
When you mark a vendor as inactive, Vendorapp guides you through the offboarding steps: access revocation, data handling, documentation. Nothing is marked as complete until the checklist is done. The workflow is the process — which means the process happens consistently, regardless of who's doing it.
Inactive vendors are paused in Vendorapp, not deleted. Their full history — assessments, contracts, relationships, offboarding record — is preserved and searchable. When an auditor asks for your vendor history including terminated relationships, it's all there. No reconstruction required.
Notes, confirmations, and evidence from the offboarding process — including data deletion confirmations — are stored in the vendor record alongside the relationship history. The audit trail is complete and self-contained.
When a contract expires or is cancelled, Vendorapp can trigger an offboarding alert — prompting the process before the relationship has fully wound down, when memories are still fresh and access revocation is easiest to do thoroughly.
If a vendor relationship is restarted — common with contractors and specialist service providers — a paused vendor can be reactivated rather than rebuilt from scratch. The full history is available, and a new onboarding assessment can be run on the existing profile.
FAQ
Retention requirements vary by context. For SOC 2 Type II and ISO 27001 audit purposes, you need records going back at least as far as your audit period — typically 12 months, but sometimes longer for surveillance audits. For GDPR purposes, records of data processing activities (including terminated processor relationships) should generally be retained for several years after termination — the ICO doesn't specify an exact period, but "as long as reasonably necessary" given potential data subject requests and regulatory inquiries is the practical standard. Many companies retain vendor records for five to seven years as a general policy. In Vendorapp, terminated vendor records are retained indefinitely by default — there's no automatic deletion.
This is a common situation, particularly for vendors onboarded before systematic access tracking was in place. The practical approach is to work through what you do know — check your OAuth connected apps list, review your API credential management system, check your cloud provider's IAM console for third-party roles, review webhook configurations — and document what you've checked and what you found. Where access was granted but records don't exist, note this in your offboarding documentation and treat the vendor's access as potentially active until you've verified otherwise. Going forward, documenting vendor access at onboarding is the prevention — Vendorapp's onboarding workflow helps ensure this is captured from the start.
A vendor's refusal to confirm data deletion is a compliance issue on their side — and potentially a breach of your data processing agreement. First, refer to your DPA or contract: what are they obligated to do and by when? Put your request in writing (email is fine) and keep a copy. If they continue to refuse, this is worth escalating — both through their account management chain and, if the data involved is personal data, potentially to the ICO. Document everything: the request, the refusal, and all subsequent communications. Your obligation under GDPR is to take reasonable steps to ensure deletion — documented attempts are evidence of reasonable steps, even if the vendor is non-compliant.
Yes, if the tool has access to your systems or data. A free analytics tool with a tracking pixel on every page, a free tier of a developer tool with access to your codebase, a free account on a platform that has OAuth access to your systems — all of these represent vendor relationships that require proper offboarding when you stop using them, regardless of whether money changed hands. The access and data risk is the same whether you paid for the relationship or not. In practice, free tools are often the most neglected in offboarding processes — because there's no invoice to cancel, there's no obvious trigger for the offboarding conversation.
When a vendor ceases trading, the primary concern is access and data. Revoke all credentials and access immediately — you can no longer rely on the vendor to maintain their systems securely, and an insolvent company's systems are often prime targets for attackers who know security maintenance has stopped. Retrieve any data you need that the vendor held. Regarding data deletion obligations: if the vendor has ceased trading and there's no entity to approach, document your attempts to contact them and the circumstances. Regulators generally take a pragmatic view of obligations that become impossible to fulfil through no fault of your own — but you need to demonstrate that you tried and that you've revoked access promptly.
Start free and build a vendor management programme where offboarding is as systematic as onboarding. Paused, never deleted, always audit-ready.
Start free — no card neededWe use cookies to analyze usage and enhance site navigation to give you the best experience.