VendorappResourcesVendor offboarding
Security & compliance

You cancelled the contract. Did you cancel the access?

When you stop using a vendor, the commercial relationship ends. But the API credentials, OAuth tokens, data access permissions, and webhook integrations often don't. Incomplete vendor offboarding is one of the most common unmanaged security risks in fast-growing companies — and one of the first things an auditor or penetration tester will find.

Audit-ready by defaultPaused, never deletedFull offboarding trailFree forever plan

Why this happens

Vendor offboarding is the last thing anyone thinks about. It's also one of the most important.

When you onboard a vendor, there's usually a project. Someone is leading the implementation, credentials are being created, integrations are being built, and access is being provisioned. It's a visible, active process that people are paying attention to.

Offboarding is the opposite. It happens at the end of a relationship, often when the company has moved on to something else, sometimes after the person who managed the original relationship has left. The cancellation email gets sent, the payment stops, and then — nothing. The access that was provisioned during onboarding just sits there, dormant but present.

The problem compounds over time. A company that's three years old and has been growing quickly has probably changed its vendor stack significantly. Tools get replaced, contracts get cancelled, integrations get deprecated. But the credentials and access permissions from those old relationships accumulate unless someone is actively cleaning them up. By the time a penetration test or audit surfaces the issue, there can be years' worth of stale vendor access sitting in your systems.

A penetration test finding of "stale third-party API credentials with production access" is not unusual for companies that have grown quickly without a systematic offboarding process. These credentials represent genuine security risk — they're real access to real systems, and they don't expire because a contract did.

The security risks

What incomplete vendor offboarding actually exposes you to.

Persistent system access

API credentials and OAuth tokens granted during a vendor relationship typically remain valid after the relationship ends. A former vendor — or anyone who has obtained their credentials — retains access to your systems.

Data retention violations

Vendors that handled your data during the relationship may still be retaining it after offboarding — in violation of your data processing agreement and potentially of data protection law. Without formal offboarding, you have no evidence that data deletion was requested or confirmed.

Webhook and integration exposure

Webhooks that were set up to push data to a vendor's systems may continue firing after the relationship ends, sending your operational data to an endpoint you no longer control or monitor.

Supply chain attack surface

If a former vendor suffers a breach, attackers who find their way in may discover credentials for your systems that were never revoked. Your former vendor's breach becomes your current security incident.

These aren't theoretical risks. Supply chain attacks via compromised third-party credentials have become one of the most common attack vectors for sophisticated threat actors. The SolarWinds attack, the Kaseya incident, and numerous smaller-scale supply chain compromises all involved attackers gaining access via third-party relationships — in some cases, via former vendor relationships where access had not been properly revoked.

The compliance risks

What auditors and regulators look for in your offboarding process.

Security risk is the obvious concern with poor vendor offboarding. But the compliance implications are equally significant — and are increasingly the focus of SOC 2, ISO 27001, and financial services audits.

SOC 2 and vendor offboarding

SOC 2 CC9.2 — the vendor management control — includes requirements around how you terminate vendor relationships. Auditors are looking for evidence that when a vendor relationship ends, access is revoked systematically, data is handled per contractual terms, and the termination is documented in your vendor register. The key word is evidence: not a policy that says you do this, but documentation showing that it has been done for specific terminated relationships during the audit period.

ISO 27001 and supplier offboarding

ISO 27001:2022 A.5.19 explicitly covers the termination or change of supplier relationships. Auditors expect to see a documented offboarding process — what happens when a supplier relationship ends, who is responsible for revoking access, how data deletion is confirmed, and how the supplier register is updated. The 2022 revision places greater emphasis on this than the 2013 standard, and it's an area where audit findings have become more common.

GDPR and data processor offboarding

Under GDPR, when you terminate a relationship with a data processor — a vendor that handles personal data on your behalf — you're required to ensure that your personal data is either returned or deleted, as specified in your data processing agreement. Without a systematic offboarding process, you have no evidence that this obligation has been met. In the event of a data subject access request or a regulatory inquiry, this gap becomes very visible.

During our SOC 2 Type II audit, we were asked to demonstrate our vendor offboarding process and provide examples of recent offboardings. We had a policy document but no evidence of it being followed. The auditor found three former vendors with active API credentials in our production systems. It was a significant finding and added two months to our remediation timeline.
Head of Engineering, 70-person SaaS company

What good looks like

The vendor offboarding checklist every company needs.

A proper vendor offboarding process doesn't need to be bureaucratic. It needs to be systematic — a defined set of steps that happen every time a vendor relationship ends, with documentation that proves they happened. Here's what that looks like:

Access revocation

  • Revoke all API keys and tokens issued to the vendor
  • Remove OAuth connections and application authorisations
  • Disable or delete user accounts created for vendor personnel
  • Remove webhook endpoints pushing data to vendor systems
  • Revoke network access permissions and IP allowlist entries
  • Remove vendor personnel from shared systems (Slack, Notion, etc.)

Data handling

  • Request data deletion or return per the contractual terms
  • Obtain written confirmation of data deletion from the vendor
  • Retrieve any company data held by the vendor that you want to retain
  • Confirm deletion of personal data per DPA terms and document it
  • Check for any data that may have been shared outside the primary system

Documentation and closure

  • Mark the vendor as inactive in your vendor register (not deleted)
  • Record the termination date and reason
  • Document the access revocation steps taken and when
  • File the final correspondence and any termination agreement
  • Update any business continuity or operational resilience documentation that referenced the vendor
The key principle of vendor offboarding documentation is that the record must survive the relationship. Marking a vendor as inactive and retaining the offboarding record — rather than deleting the vendor entirely — is what gives you the audit trail that SOC 2, ISO 27001, and GDPR compliance require.

Where things go wrong

The five most common vendor offboarding failures.

  • No process at all. The most common situation: the contract is cancelled, payment stops, and nothing else happens. Nobody owns the offboarding. No access is revoked. No documentation is created. The vendor relationship just goes quiet.
  • Partial offboarding — the obvious bits only. The main user account gets disabled, but the API credentials that a developer created eighteen months ago remain active. The commercial relationship is terminated, but the webhook that was set up during integration still fires. Offboarding that covers the visible parts but misses the technical residue is almost as risky as no offboarding at all.
  • The former employee problem. The person who managed the vendor relationship — and who knew about all the integrations and credentials they set up — has left the company. Offboarding becomes a forensic exercise: trying to reconstruct what access was granted during an onboarding you weren't part of.
  • No data deletion evidence. The vendor is told to delete your data. They say they have. Nobody has it in writing, and nobody has checked. For GDPR purposes, the obligation to ensure your processor has deleted personal data isn't satisfied by a verbal assurance from an account manager.
  • The vendor register is cleaned up instead of archived. The vendor is deleted from the register when the relationship ends, destroying the documentation of the relationship and the offboarding process. Auditors need to see a history of vendor relationships — including terminated ones — not just the current active list.

How Vendorapp handles it

Paused, never deleted. Audit-ready by design.

Vendorapp is built around a core principle of offboarding documentation: when a vendor relationship ends, the vendor is paused — not deleted. The full history of the relationship, the assessments, the contract records, and the offboarding documentation are preserved indefinitely and are always accessible to auditors.

  1. 1

    Structured offboarding workflow

    When you mark a vendor as inactive, Vendorapp guides you through the offboarding steps: access revocation, data handling, documentation. Nothing is marked as complete until the checklist is done. The workflow is the process — which means the process happens consistently, regardless of who's doing it.

  2. 2

    Paused status — preserved, not deleted

    Inactive vendors are paused in Vendorapp, not deleted. Their full history — assessments, contracts, relationships, offboarding record — is preserved and searchable. When an auditor asks for your vendor history including terminated relationships, it's all there. No reconstruction required.

  3. 3

    Offboarding documentation in the vendor record

    Notes, confirmations, and evidence from the offboarding process — including data deletion confirmations — are stored in the vendor record alongside the relationship history. The audit trail is complete and self-contained.

  4. 4

    Smart alerts for offboarding triggers

    When a contract expires or is cancelled, Vendorapp can trigger an offboarding alert — prompting the process before the relationship has fully wound down, when memories are still fresh and access revocation is easiest to do thoroughly.

  5. 5

    Reactivation when needed

    If a vendor relationship is restarted — common with contractors and specialist service providers — a paused vendor can be reactivated rather than rebuilt from scratch. The full history is available, and a new onboarding assessment can be run on the existing profile.

Vendorapp's approach to vendor history is built specifically for audit requirements: inactive vendors are never deleted, offboarding records are immutable, and the full relationship history is always exportable. This is the difference between a vendor management tool and an audit-ready vendor management programme.

FAQ

Vendor offboarding questions we hear most often.

How long should we retain records of terminated vendor relationships?+

Retention requirements vary by context. For SOC 2 Type II and ISO 27001 audit purposes, you need records going back at least as far as your audit period — typically 12 months, but sometimes longer for surveillance audits. For GDPR purposes, records of data processing activities (including terminated processor relationships) should generally be retained for several years after termination — the ICO doesn't specify an exact period, but "as long as reasonably necessary" given potential data subject requests and regulatory inquiries is the practical standard. Many companies retain vendor records for five to seven years as a general policy. In Vendorapp, terminated vendor records are retained indefinitely by default — there's no automatic deletion.

What if we don't know everything the vendor had access to?+

This is a common situation, particularly for vendors onboarded before systematic access tracking was in place. The practical approach is to work through what you do know — check your OAuth connected apps list, review your API credential management system, check your cloud provider's IAM console for third-party roles, review webhook configurations — and document what you've checked and what you found. Where access was granted but records don't exist, note this in your offboarding documentation and treat the vendor's access as potentially active until you've verified otherwise. Going forward, documenting vendor access at onboarding is the prevention — Vendorapp's onboarding workflow helps ensure this is captured from the start.

The vendor we're offboarding is refusing to confirm data deletion. What do we do?+

A vendor's refusal to confirm data deletion is a compliance issue on their side — and potentially a breach of your data processing agreement. First, refer to your DPA or contract: what are they obligated to do and by when? Put your request in writing (email is fine) and keep a copy. If they continue to refuse, this is worth escalating — both through their account management chain and, if the data involved is personal data, potentially to the ICO. Document everything: the request, the refusal, and all subsequent communications. Your obligation under GDPR is to take reasonable steps to ensure deletion — documented attempts are evidence of reasonable steps, even if the vendor is non-compliant.

Does vendor offboarding apply to free tools as well as paid contracts?+

Yes, if the tool has access to your systems or data. A free analytics tool with a tracking pixel on every page, a free tier of a developer tool with access to your codebase, a free account on a platform that has OAuth access to your systems — all of these represent vendor relationships that require proper offboarding when you stop using them, regardless of whether money changed hands. The access and data risk is the same whether you paid for the relationship or not. In practice, free tools are often the most neglected in offboarding processes — because there's no invoice to cancel, there's no obvious trigger for the offboarding conversation.

How do we handle offboarding for a vendor that has gone out of business?+

When a vendor ceases trading, the primary concern is access and data. Revoke all credentials and access immediately — you can no longer rely on the vendor to maintain their systems securely, and an insolvent company's systems are often prime targets for attackers who know security maintenance has stopped. Retrieve any data you need that the vendor held. Regarding data deletion obligations: if the vendor has ceased trading and there's no entity to approach, document your attempts to contact them and the circumstances. Regulators generally take a pragmatic view of obligations that become impossible to fulfil through no fault of your own — but you need to demonstrate that you tried and that you've revoked access promptly.

Close the loop on every vendor relationship — properly.

Start free and build a vendor management programme where offboarding is as systematic as onboarding. Paused, never deleted, always audit-ready.

Start free — no card needed

We use cookies to analyze usage and enhance site navigation to give you the best experience.

Cookie Policy