Back to blog
Work Security
7 min

Employee Onboarding Security Checklist: A Complete Guide for IT Teams

A comprehensive security checklist for onboarding new employees. Covers account provisioning, password policies, 2FA setup, security training, and access control.

LOCK.PUB
2026-02-25
Employee Onboarding Security Checklist: A Complete Guide for IT Teams

Employee Onboarding Security Checklist: A Complete Guide for IT Teams

Every new hire requires dozens of accounts, access permissions, and credentials. Rush through this process, and you create security gaps that persist for months -- or until a breach exposes them. Sending temporary passwords through Slack DMs, using the same default password for every new hire, or postponing 2FA setup are all common mistakes with serious consequences.

This guide provides a practical, step-by-step security checklist for onboarding new employees.

Pre-Arrival Preparation (D-3 to D-1)

Account Provisioning

Prepare all required accounts before the employee's first day.

Item Details Priority
Email account Create company domain email Essential
Slack/Teams Create workspace account Essential
Cloud storage Google Drive/OneDrive folder access Essential
Project management Jira/Notion/Asana account High
VPN access Remote access VPN credentials If applicable
Source code repo GitHub/GitLab invitation Engineering

Device Preparation

  • Apply company security policy to laptop/desktop
  • Enable full disk encryption (BitLocker/FileVault)
  • Install endpoint protection software
  • Configure automatic screen lock (1 minute)
  • Set up remote wipe capability (MDM)
  • Pre-install required applications

Day One (D-Day)

Step 1: Password Policy Briefing

Cover password requirements on the first day without exception.

Minimum Requirements:

  • Length: 12 characters or more
  • Composition: uppercase, lowercase, numbers, special characters
  • Prohibited: names, birthdays, sequential numbers, dictionary words
  • No reuse: cannot reuse previous passwords
  • Rotation: change every 90 days

Password Manager Deployment:

  • Deploy an enterprise password manager (1Password Business, Bitwarden)
  • Store all work account credentials in the manager
  • Only the master password needs to be memorized
  • Enable emergency access for IT administrators

Step 2: Two-Factor Authentication (2FA) Setup

Set up 2FA on all critical accounts on day one.

Account 2FA Method Priority
Email Authenticator app (Google Authenticator, Authy) Essential
Slack/Teams Authenticator app Essential
Cloud storage Authenticator app Essential
VPN Hardware key (YubiKey) or authenticator app Essential
GitHub/GitLab Authenticator app or hardware key Engineering
Admin panels Hardware key recommended Admin roles

Important: Avoid SMS-based 2FA where possible -- it is vulnerable to SIM-swapping attacks. Authenticator apps or hardware keys are significantly more secure.

Step 3: Secure Initial Credential Delivery

Delivering temporary credentials safely is critical.

What NOT to do:

  • Send passwords through Messenger or Slack DM
  • List all account passwords in a single email
  • Write passwords on sticky notes
  • Use a shared default password for all new hires

What TO do:

  • Share initial passwords via LOCK.PUB password-protected memos (24-hour expiry)
  • Force password change on first login
  • Use different temporary passwords for each service
  • Deliver the memo link via email, share the access password in person or via phone

First Week (D+1 to D+7)

Security Awareness Training

Conduct basic security training within the first week.

Required Topics:

  1. Phishing recognition: How to identify suspicious emails, links, and attachments
  2. Password management: How to use the company password manager
  3. Device security: Screen lock, disk encryption, lost device procedures
  4. Data classification: Confidential, internal, and public data handling
  5. Incident reporting: How and when to report security concerns

Access Control Configuration

Apply the principle of least privilege when granting access.

Role Access Scope Permission Level
Individual contributor Team resources only Read/Write
Team lead Team + cross-team resources Read/Write/Manage
IT administrator All systems Full admin
External contractor Project-specific only Read-only

Principles:

  • Start with minimum access and add as needed
  • Document every access grant with justification
  • Review and remove unnecessary permissions quarterly

Ongoing Monitoring

30-Day Review

Conduct a security review 30 days after the hire date.

  • All initial passwords have been changed
  • 2FA is active on all required services
  • No unnecessary access permissions exist
  • Password manager is being used correctly
  • Security training has been completed
  • No security incidents have been reported

Quarterly Audit

  • Review access permissions and revoke unnecessary ones
  • Verify password rotation compliance
  • Review security incident logs
  • Confirm departed employee accounts are immediately disabled

Using LOCK.PUB in the Onboarding Process

LOCK.PUB streamlines the secure delivery of initial credentials during onboarding.

  • Password-protected memos: Deliver temporary passwords with expiration times
  • Encrypted chat rooms: Secure communication channel between IT support and new hires
  • Access tracking: Monitor whether the new employee has accessed the credentials

Example Workflow

  1. Create individual password-protected memos for each service credential (24-hour expiry)
  2. Send memo links to the new hire's company email
  3. Share access passwords in person during onboarding orientation
  4. New hire accesses credentials and immediately changes passwords
  5. Memos automatically expire -- no credentials lingering in email

Offboarding Security Checklist

Onboarding security is incomplete without offboarding security.

  • Immediately disable/delete all accounts
  • Set up email forwarding if required
  • Change all shared passwords immediately
  • Revoke VPN and remote access immediately
  • Recover and wipe company devices
  • Remove cloud storage access
  • Remove source code repository access
  • Recover physical access cards and badges
  • Review and revoke third-party service access

Conclusion

A security-first onboarding process strengthens your entire organization. From account provisioning to password policies, 2FA setup, security training, and access control -- each step matters. Avoid sending temporary passwords through chat apps or email. Use tools with expiration and password protection to ensure credentials are delivered securely and do not persist in communication logs.

Create a password-protected memo on LOCK.PUB for your next new hire onboarding.

Create a Secret Memo →

Keywords

employee onboarding security
onboarding security checklist
IT onboarding
account provisioning
2FA setup employee
access control onboarding

Create your password-protected link now

Create password-protected links, secret memos, and encrypted chats for free.

Get Started Free
Employee Onboarding Security Checklist: A Complete Guide for IT Teams | LOCK.PUB Blog