Implementing ISO 27001 Annex A 8.10 Information Deletion
Welcome to our guide on Annex A 8.10. If you are new to ISO 27001, the sheer number of controls can feel overwhelming. You might feel tempted to focus only on firewalls or passwords. However, how you get rid of data is just as vital as how you protect it.
At iso27001.com, we often see organisations hoard data. They keep old files just in case they might need them later. This habit creates significant risk. Annex A 8.10 addresses this by ensuring you delete information when it is no longer required. This guide will help you understand what this control means and how to implement it effectively.
Table of contents
What is Annex A 8.10?
Annex A 8.10 is titled Information Deletion. It is a preventive control found in the technological theme of ISO 27001:2022. The primary goal is to prevent unnecessary exposure of sensitive information. It also ensures you comply with legal, statutory, regulatory, and contractual requirements for data deletion.
Simply put, you cannot keep data forever. When the retention period expires, or the data is no longer useful, you must delete it. You must also ensure that the deletion is secure. If you delete a file, it should not be easily recoverable by a hacker or a curious employee.
Why is Information Deletion Important?
You might wonder why deleting files requires a formal process. There are two main reasons. The first is compliance. Laws like the GDPR impose strict rules on how long you can hold personal data. If you keep customer data longer than necessary, you break the law.
The second reason is security. Every piece of data you hold is a potential target. If you suffer a data breach, old and useless data can still cause harm. By deleting what you do not need, you reduce the impact of a potential breach. You are essentially reducing your attack surface.
Step-by-Step Implementation Guide
Implementing this control does not need to be complex. You can follow a logical flow to ensure you cover all bases. Here is how we recommend you approach it.
1. Locate Your Data
You cannot delete what you cannot find. Start by mapping out where your information lives. This includes cloud storage, physical servers, employee laptops, and even paper files. You need a clear inventory of assets.
2. Define Retention Rules
You need to know how long to keep specific types of data. Financial records might need to be kept for seven years. Customer emails might only be needed for one year. Consult your legal team or check local regulations. Document these timeframes in a Data Retention Policy.
3. Choose Secure Deletion Methods
Pressing the delete key is often not enough. For digital data, you might need special software that overwrites the file space. This prevents recovery tools from bringing the file back. For physical media like hard drives or paper, you need destruction methods. This could involve shredding paper or crushing disks.
4. Automate Where Possible
Relying on memory is risky. Configure your systems to delete data automatically. For example, you can set email inboxes to archive or delete messages after a certain period. Automation ensures consistency.
5. Manage Third Parties
If you use cloud providers, you must check their deletion processes. When you leave a service, do they delete your data immediately? You should ask for contractual assurance that your data is gone for good.
What the Auditor Expects
When an auditor from a certification body visits, they look for evidence. They need to see that your process works in the real world. At iso27001.com, we advise our clients to prepare specific items to show compliance.
We expect to see a clear policy. This document should state how and when you delete information. It should be easy for your staff to read and understand.
We also look for records of destruction. If you hire a company to shred confidential paper, keep the certificate of destruction. If you wipe laptops before selling them, keep a log of the serial numbers and the date of wiping. These logs are your proof.
Finally, we will interview your staff. We might ask an employee how they dispose of sensitive drafts. If they say they throw them in the general waste bin, that is a non-conformity. They should know to use the confidential shredding bins.

Common Pitfalls to Avoid
Even with good intentions, mistakes happen. One common error involves backups. You might delete a live database but forget that the data exists on a backup tape or a cloud snapshot. Ensure your deletion procedures account for backups.
Another issue is licensed software. When you stop using a software tool, you should remove it. Keeping unlicensed or unused software adds vulnerability to your network. Ensure you delete the software and any associated data.
Getting Started
Implementing Annex A 8.10 protects your business and your reputation. It ensures you respect the privacy of your clients and stay on the right side of the law. Start by reviewing your current data retention rules. If you do not have any, that is your first task.
If you need further guidance or templates to get you started, iso27001.com is here to support your journey. We can help you navigate the complexities of certification with confidence.
