
Mark has joined your sales team. First day, first hour, his laptop hasn’t arrived, his email isn’t active, and nobody told him how to raise a ticket. By noon, he’s spent his entire first morning doing nothing productive. By the end of the week, he’s decided this place isn’t as organized as it looked in the interview.
I’ve seen this exact scenario plays out thousands of times across companies that know what good onboarding looks like but haven’t built the systems to make it happen reliably. The problem comes down to execution at scale.
The hard part is making it happen consistently, every time someone new joins, without the whole thing depending on someone manually holding it together.
This checklist is what I use at Atomicwork: the full onboarding journey from the moment a contract is signed to the 90-day mark, when a new hire should be working autonomously without IT’s help.
IT onboarding that begins on day one is already late. The most effective programs start the moment an offer is accepted, and not when the new hire walks through the door (or logs in remotely). A well-executed pre-boarding phase eliminates first-day friction that’s entirely preventable.
The goal is simple: when the hire shows up on day one, everything should already work.
💡Pro tip: Automate provisioning triggers directly from your HRIS. When an offer is accepted in Workday or BambooHR, a workflow can kick off the entire provisioning sequence: hardware request, account creation, license assignment without a single IT ticket being raised manually.
Why this matters: Manual provisioning creates unnecessary delays, IT overhead, and a poor first impression that’s hard to undo.

Day one is a high-stakes moment. A broken setup, say, accounts that don’t work, a laptop that isn’t configured, or MFA that no one walked the new hire through is costly in two ways: it kills productivity immediately, and it signals organizational dysfunction. Obviously, neither is acceptable.
The day-one checklist is about confirming that everything provisioned in pre-boarding actually works, and that the new hire knows how to use what they’ve been given.
💡Pro tip: We use dynamic employee groups to auto-provision apps and devices based on role, department, and location. A sales engineer in Singapore gets a different configuration than a backend engineer in Bengaluru, automatically, with no manual differentiation required from IT.
Common pitfall: MFA is the most frequently skipped item on day-one checklists, especially when the new hire is remote and doing self-setup. Make enrollment mandatory before any other accounts are accessible.

Getting someone logged in is the beginning of onboarding. The first week should confirm that the new hire can access every system their role requires, understands key workflows, and has had permissions audited against the least-privilege principle.
This is also when the first compliance and security training happens. It must be structured and tracked as part of their first five business days.
💡Pro tip: Share the full first-week training schedule on day one so nothing feels ad hoc. Transparency reduces anxiety for new hires and signals that the organization is well-run. When people know what’s coming, they prepare better and resist less.
On least-privilege: Every user account should have only the access they need for their role, and nothing more. Over-provisioning is as dangerous as under-provisioning. A marketing manager with read access to the production database is a misconfigured account waiting to become a security incident.
Bring Your Own Device policies create real security risk when they’re vague, inconsistently enforced, or rely on employee self-compliance. At the same time, a blanket ‘no personal devices’ policy is impractical for many organizations, especially remote-first ones.
The right approach: clear, documented standards with MDM enrollment as a non-negotiable prerequisite before any personal device touches corporate data.
Recommended tools: Intune (Microsoft Endpoint Manager) and Jamf are the leading MDM platforms for enterprise BYOD management. Jamf is stronger for Apple-first environments; Intune is the default choice for Microsoft-centric organizations. Both support containerization to separate personal and corporate data on the same device.
A note on enforcement: The BYOD policy only works if it’s a precondition for access, and not something you try to enforce retroactively. Build the acknowledgment into your pre-boarding flow so it’s signed before the first account is provisioned.
Shadow IT is the set of tools, apps, and services that employees use without IT's knowledge or approval. It’s a real and growing problem in most organizations, and it’s almost never malicious in intent. People adopt unapproved tools because approved ones are too slow to provision, too hard to use, or simply not good enough.
Effective shadow IT prevention requires a two-pronged approach: make approved tools genuinely frictionless to access, and clearly communicate why unapproved tools are a risk.
The four pillars of shadow IT prevention:
💡Pro tip: Shadow IT is a symptom of poor tooling experience, not malicious intent. If the gap between ‘I need this tool’ and ‘I can use this tool’ is measured in weeks, people will close that gap themselves. Fix the provisioning experience first.
AI tool governance is the most frequently missing section of corporate onboarding programs right now. The average knowledge worker has access to dozens of AI tools, some company-provided, most not, and most organizations have no clear policy on what’s approved, what’s restricted, and what constitutes a data policy violation.
This gap is a huge compliance and IP risk. Every new hire should review and acknowledge an AI usage policy as part of their first-week training. The more specific the policy is, the better it is.
Why this matters now: A recent Gartner survey of ~300 cybersecurity leaders says that 69% of organizations ‘suspect or have evidence’ that employees are using prohibited public GenAI or shadow IT, in other words. Most do it without realizing they were violating policy. A clear, acknowledged AI governance policy reviewed during onboarding closes this gap before it becomes an incident.
Security training that happens three months after someone starts is security training that’s too late. All cybersecurity modules should be completed within the first five business days. More importantly, the completion should be tracked and reported to management, not self-attested.
New hires are navigating unfamiliar systems, learning new workflows, and building relationships with colleagues they don’t yet know well. These are the exact conditions that make social engineering attacks more likely to succeed.
💡Pro tip: All cybersecurity training must be completed within the first five business days. Completion is tracked in the ITSM platform and flagged to the manager’s dashboard if overdue. Training is not self-reported, completion is verified via the training platform’s API.
Compliance note: For organizations subject to SOC 2 Type II, HIPAA, or ISO 27001, training completion records are auditable evidence. Hence, you must automate the tracking. Don’t rely on spreadsheets or manual follow-up.
A fragmented identity architecture is the root cause of most provisioning delays, access review failures, and offboarding gaps. The goal should be a single source of truth, one authoritative directory that all downstream systems sync from, automatically.
For most enterprise environments, that means MS Entra (Azure AD) at the center of a connected identity architecture.
Core principles:
Reference architecture: HRIS (Workday / BambooHR) → MS Entra → SSO (Okta / Entra) → SaaS Apps + MDM + VPN.
Onboarding must have a structured follow-up cadence. This ensures new hires are fully productive and that IT access remains appropriate as their role evolves. The 30/60/90-day model provides natural checkpoints for different kinds of verification.
Days 1–30
Days 31–60
Days 61–90
💡Pro tip: Schedule these check-ins automatically in your ITSM platform. Set triggers at 30, 60, and 90 days from hire date to generate tasks, surveys, and access review requests. Manual calendar reminders will get missed.
Contractors and vendors present a distinct set of IT risks. They often need scoped, time-limited access to internal systems without the full identity footprint of a full-time employee.
Many organizations treat contractor onboarding as a lighter version of employee onboarding. That’s a mistake. Contractors need a structured track that’s different in kind, not just lighter in scope.
💡Pro tip: Never reuse a former contractor’s account for a returning contractor. Always create a fresh identity. Reusing accounts breaks audit integrity and creates compliance exposure, especially under SOC 2 and GDPR, where clear user attribution is required for access logs.
For vendors with ongoing system access (managed service providers, SaaS vendors with admin access to your environment), apply Privileged Access Management controls. There are tools to ensure that privileged sessions are recorded, time-limited, and subject to approval workflows.
The mantra is: What gets measured gets improved. Most IT teams can tell you how many tickets they closed this week, but can’t tell you how many tickets were generated by new hires in their first 30 days, or what their average time-to-productivity is. These are the metrics that matter for onboarding.
Pro tip: Track metrics by cohort, say, monthly hire groups, to identify trends and measure the impact of process improvements over time. A metric that looks fine in aggregate may reveal a specific month where provisioning delays spiked, pointing to a specific process or tool failure that’s otherwise invisible.
Use these metrics to build a quarterly onboarding review with HR and IT leadership. Show the data, identify the friction points, and make the case for automation investment. The ROI is concrete and measurable.
IT onboarding done well is a repeatable system as it is automated, auditable, and continuously improved based on data. The investment in getting it right pays back every hire cycle in reduced IT overhead, lower time-to-productivity, and a materially better employee experience.
The checklist in this guide is a starting point. Adapt it for your team, automate what you can, and measure what matters. The organizations that treat onboarding as a system are the ones consistently getting new hires to full productivity in under 30 days.



