Separation Readiness Checklist

Before You Let Go
Checklist If you’re preparing to part ways with your IT staff—especially your only IT person—this checklist outlines the most common critical systems and access points you must secure first. It’s essential to take control of your company’s digital assets, accounts, and infrastructure before any transition.

Make sure you:
Have direct admin access to key platforms (email, domains, cloud, backups, etc.)
Secure all business-critical credentials and recovery methods
Review and collect any IT documentation, network diagrams, vendor contracts, and internal procedures


This isn’t just about protection—it’s about business continuity and future-proofing your operations. Get your hands on everything you can now, while cooperation is still possible. Top Priorities (Critical Business Control)
1️⃣ Admin Access to Email Services (e.g., Microsoft 365, Google Workspace)
Confirm ownership of global admin accounts
Ensure billing and recovery options are linked to company-controlled accounts
2️⃣ Domain & DNS Registrar Access (GoDaddy, Namecheap, Cloudflare, etc.)
Ensure company executives control domain settings
Verify access to DNS records to avoid outages
3️⃣ Admin Access to Business-Critical Applications
CRM, ERP, accounting software, inventory systems, etc.
Reset shared passwords and review API integrations
4️⃣ Admin Access to Cloud Services & Servers
AWS, Azure, Google Cloud, or on-premises servers
Confirm access to root/admin accounts and backup credentials
5️⃣ Admin Privileges in Active Directory / User Management Systems
Ensure at least one C-level executive has domain admin rights
Disable unused accounts and enforce MFA


High Priority (Security & Operations Stability)
6️⃣ Administrative Access to Telecom & Communication Services
Phone systems (VoIP, Zoom, Microsoft Teams, RingCentral, etc.)
Internet service provider (ISP) and network management portals
7️⃣ Access to Data Backups & Recovery Systems
Confirm full administrative access to cloud/local backups
Validate backup frequency and restore procedures
8️⃣ Admin Access to IT Remote Management & Security Tools
RMM (Remote Monitoring & Management) platforms
Endpoint security, antivirus, and patch management tools
9️⃣ Access to Password Management Systems (if used)
Ensure master access to tools like LastPass, Bitwarden, or 1Password


Other Critical Considerations (IT Dependencies)
 License Ownership & Software Subscriptions
Ensure licenses are under company ownership (not personal accounts)
Review auto-renewal settings and payment methods
 Firewall & Network Equipment Admin Access
Ensure access to firewalls, routers, and switches
Review and document network configurations
 Vendor & IT Service Provider Contracts
Review managed services agreements (MSPs, SaaS, hosting, etc.)
Identify any vendor dependencies on IT staff