Mergers, acquisitions, and divestitures often leave behind unresolved identity exposure long after migration is complete. This checklist helps IT and security teams identify residual identity risk, unwind temporary coexistence, and complete the work required to retire legacy dependencies and establish a cleaner, more governable identity environment.