An employee leaves the company. Three months later, IT discovers that the former employee’s laptop was never returned, a security token is still active and a shared folder password was never changed. The employee had been the sole administrator of a critical system — and nobody documented how it works. A.5.11 exists to prevent exactly this chain of oversights by requiring a structured asset return process.
Asset return is where HR, IT and information security intersect. A well-executed offboarding process protects the organisation’s information, preserves institutional knowledge and ensures that no equipment or access rights remain unaccounted for.
What does the standard require?
- Return all organisational assets. Personnel and external parties must return all organisational assets in their possession when their employment, contract or agreement is terminated or changed.
- Cover all asset types. The return process applies to physical assets (equipment, keys, badges), digital assets (software, data, credentials) and intangible assets (knowledge, process documentation).
- Handle personal devices. Where personnel have used personal devices for organisational purposes, the organisation’s information must be securely transferred and then deleted from those devices.
- Document the return. The organisation must record which assets were returned, when and by whom. Any outstanding items must be tracked and escalated.
- Transfer critical knowledge. Departing personnel must hand over essential knowledge — system configurations, undocumented procedures, passwords — before their departure.
In practice
Create a standardised offboarding checklist. The checklist should cover: hardware return, access card and key return, software licence reassignment, data backup and handover, knowledge transfer sessions, shared credential rotation, and deletion of organisational data from personal devices.
Start early. Initiate the offboarding process as soon as the departure is confirmed. Schedule knowledge transfer sessions in the first week of the notice period, not the last day. Critical system documentation should be created before departure, with enough time for review.
Coordinate across departments. Asset return involves HR (employment records, notice period), IT (equipment, access revocation), facilities (keys, parking), the line manager (knowledge transfer, work handover) and information security (credential rotation, data handling). A central coordination point — typically HR — ensures nothing falls through the cracks.
Handle contractors and external parties. The return process applies equally to contractors, consultants and temporary staff. Include asset return clauses in contracts and ensure that the offboarding process is triggered automatically when a contract ends.
Typical audit evidence
Auditors typically expect the following evidence for A.5.11:
- Offboarding checklist template — showing the standardised process for asset return
- Completed offboarding records — signed checklists for departed employees confirming all assets were returned
- Asset inventory updates — showing that assets were reassigned or decommissioned after return
- Knowledge transfer records — documentation of handover sessions and critical information transfer
- Outstanding item tracking — evidence that unreturned assets were followed up and resolved
KPI
% of departing employees whose assets were fully returned and documented
This KPI measures the completeness of the offboarding process. Target: 100%. Track both the total number of departures in the period and the number with fully completed asset return documentation. Any gap represents potential data leakage or unaccounted equipment.
Supplementary KPIs:
- Average time between departure date and completion of all asset returns
- Number of assets reported as unreturned or lost per quarter
- Percentage of departures with documented knowledge transfer
BSI IT-Grundschutz
A.5.11 maps to the following BSI requirements:
- ORP.2.A2 (Regulations for departure of employees) — requires a formal process for handling employee departures, including return of all organisational property and revocation of access rights.
- ORP.4.A2 (Revocation of access rights) — mandates timely removal of all access rights when personnel leave or change roles.
- ORP.2.A4 (Regulations for use of external personnel) — extends the same return and revocation requirements to external staff.
Related controls
A.5.11 protects the organisation during personnel transitions:
- A.5.9 — Inventory of information and other associated assets: The asset inventory provides the baseline for the return checklist.
- A.5.10 — Acceptable use: Acceptable use obligations end with asset return; any remaining data on personal devices must be handled.
- A.5.12 — Classification of information: Classified information in the departing person’s possession requires special handling during return.
- A.5.13 — Labelling of information: Labelled assets are easier to identify during the return process.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.11 — Return of assets
- ISO/IEC 27002:2022 Section 5.11 — Implementation guidance
- BSI IT-Grundschutz, ORP.2 — Personnel