Skip to contentAbout Fig Group

People Lifecycle

Joiner-mover-leaver automation with HRIS sync, access provisioning, and secure offboarding.

The challenge

Does this sound familiar?

New starters wait days for access. Role changes leave old permissions in place. Leavers retain access weeks after departure. HR and IT hand off via email and spreadsheets with no audit trail.

How Fig helps

People Lifecycle with Fig

Joiner Automation

HRIS-triggered workflows automatically provision access, assign training, allocate equipment, and send policy sign-off requirements. New starters are compliant from day one.

Mover Workflows

Role changes trigger access reviews, updated training requirements, and equipment reallocation. Old permissions revoked automatically. No accumulation of access over time.

Leaver Offboarding

Secure offboarding with access revocation, equipment recovery, knowledge transfer, and compliance evidence. Every step documented for audit.

HRIS Integration

Syncs with Workday, SuccessFactors, BambooHR, and ADP. A new starter in your HRIS automatically triggers the full onboarding workflow in Fig. No manual handoffs.

Core Capability

Fig enforces structured onboarding with training gates, tracks offboarding SLAs including access revocation and asset return deadlines, and detects SLA breaches automatically. HRIS sync failures trigger security alerts with retry tracking.

Audit-ready workflow

How People Lifecycle becomes evidence

People Lifecycle should not be treated as a standalone tool surface. In Fig it is part of a governed workflow: a signal is captured, an owner is assigned, a control or risk is updated, and evidence is retained so the organisation can prove what happened later.

Lifecycle

Where it sits in the operating model

The Protect phase is where this capability sits in the wider Fig operating model. New starters wait days for access. Role changes leave old permissions in place. Leavers retain access weeks after departure. HR and IT hand off via email and spreadsheets with no audit trail. Fig turns that problem into a repeatable lifecycle so MSPs, risk teams, and auditors are not relying on static spreadsheets or ad hoc screenshots when a buyer asks for proof.

Evidence captured

What auditors and buyers see

For people lifecycle, useful evidence normally includes the triggering record, the affected asset or supplier, the control requirement, the assigned owner, the decision made, the timestamp, and the outcome. That evidence is mapped back to frameworks such as Cyber Essentials, ISO 27001, NIS2, DORA, GDPR, CMMC, and internal policy requirements where relevant.

Implementation checks

Four steps to roll this out

  • 01Define who owns people lifecycle and what events should trigger review.
  • 02Connect the relevant source systems so evidence is collected continuously.
  • 03Map outputs to the frameworks and policies that matter to the organisation.
  • 04Review exceptions, accepted risks, and overdue actions before audit or renewal.

Useful references

Independent sources buyers and auditors recognise

The exact evidence required still depends on your scope, risk profile, sector, and framework obligations.

Built for you

Who uses this?

MSPs & MSSPs

Standardised JML processes across all client organisations. Portfolio-wide onboarding compliance tracking and offboarding verification.

Learn more

Security & risk teams

Automated HR-to-IT handoffs that satisfy ISO 27001 A.7 (Human Resource Security) and A.9 (Access Control) requirements without spreadsheet processes.

Learn more

Compliance & audit

Complete evidence of access provisioning, role-based training assignment, policy attestation, and secure offboarding for every employee lifecycle event.

Learn more

Common questions

Frequently asked questions

Which HRIS systems does Fig integrate with?

Workday, SuccessFactors, BambooHR, and ADP. New HRIS integrations are added based on demand. The integration is bidirectional where supported.

What happens if HR creates a starter but IT has not set up access?

Fig tracks every step of the onboarding workflow. If access provisioning is not completed within the SLA, it escalates automatically. Nothing falls through the cracks.

How does this help with ISO 27001 compliance?

ISO 27001 Annex A.7 requires structured processes for joiners, movers, and leavers. Fig automates these with documented evidence at every stage, eliminating the manual processes that auditors flag.

Can we handle contractors and temporary staff?

Yes. Contractors follow the same lifecycle workflows with configurable access expiry dates, contract-linked permissions, and automatic offboarding when the engagement ends.

Does offboarding revoke access immediately?

Fig triggers access revocation workflows immediately on leaver notification. The specific timing depends on your policy - some organisations revoke immediately, others allow a transition period. Both are configurable and documented.

Next step

See People Lifecycle in action.

Book a walkthrough tailored to your frameworks and tooling.