Return of Assets

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.11 requires that when an employee or contractor leaves the organization or changes roles, they must return all organizational assets in their possession. This includes physical hardware like laptops and keys, as well as digital assets like data files and access tokens. This control prevents unauthorized access and data leakage by ensuring that company property is recovered and accounted for immediately upon termination.

Executive Takeaway

Effective offboarding procedures that mandate the return of all physical and digital assets are critical for preventing post-employment data breaches.

ImpactHigh
ComplexityLow

Why This Matters

  • Prevents intellectual property theft and unauthorized system access by former employees
  • Ensures accurate asset inventory and reduces hardware replacement costs

What “Good” Looks Like

  • A formalized offboarding checklist is used for every departure
  • Asset return is verified against the asset inventory before final pay is released; tools like WatchDog Security's Asset Inventory can support this by showing assigned assets and their return status so verification is consistent.

It is an organizational control requiring the return of all assets upon employment change or termination, crucial for preventing data leaks and unauthorized access by former staff.

Compliance is ensured by implementing a mandatory offboarding process that includes an asset return checklist and cross-referencing returns against the asset inventory. WatchDog Security's Asset Inventory can help keep that inventory current across devices and SaaS so the checklist starts from an accurate list of assigned assets.

It covers physical assets (laptops, phones, keys), information assets (files, documents), and software assets (licenses, access tokens).

The return process should be initiated immediately upon notice of termination and completed on or before the employee's last working day.

Create a standardized offboarding checklist, assign clear responsibilities to HR and IT, and ensure the asset inventory is accurate to know exactly what needs to be returned.

Auditors look for completed offboarding checklists, signed asset return forms, and updated asset inventories showing the status change of returned items.

By ensuring the physical return of devices and the revocation of digital access, the control prevents departing employees from retaining or leaking sensitive data and intellectual property.

Risks include theft of hardware, unauthorized access to systems using unreturned credentials, and data breaches resulting from retained confidential information.

Returned digital storage media should be securely wiped or destroyed in accordance with the Media and Device Disposal policy (A.7.14) before reissue or disposal.

Best practices include conducting exit interviews to remind staff of confidentiality obligations, using automated tools to lock devices remotely, and maintaining a detailed log of all returned items.

A.5.11 is hard to execute reliably when you don't have a trustworthy list of what a person actually has—laptops, SaaS access, cloud resources, and identity-linked assets can drift over time. WatchDog Security's Asset Inventory helps by maintaining an up-to-date view of assigned and identity-mapped assets, making it easier for HR and IT to verify what must be returned or reclaimed before the departure is closed.

Auditors usually want proof that offboarding was performed consistently, not just that a policy exists—completed checklists, return confirmations, and inventory status changes are common evidence requests. WatchDog Security's Compliance Center can help track A.5.11 as a control with linked tasks and evidence items (for example, completed offboarding artifacts and inventory updates), making the audit trail easier to assemble and review.

ISO-27001 A.5.11

"Personnel and other interested parties as appropriate shall return all the organization's assets in their possession upon change or termination of their employment, contract or agreement."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication