Information that is no longer needed is not harmless.
It is unmanaged risk waiting to be exposed.
Annex A 8.10 exists to ensure organisations delete information securely when it is no longer required, preventing unauthorised disclosure, recovery, or misuse.
This control is about ending the data lifecycle deliberately, not leaving remnants behind.

Annex A 8.10 of ISO 27001:2022 focuses on secure information deletion.
At a practical level, this means:
This is a new control in ISO 27001:2022. It reflects the reality that data persistence is now a primary security and privacy risk.
Modern systems retain information by default:
If information is not deleted securely:
Annex A 8.10 ensures organisations actively remove information they no longer need, rather than assuming deletion happens automatically or safely.
A pragmatic approach to Annex A 8.10 typically includes the following elements.
Organisations should define:
Deletion should be deliberate and aligned with:
Deletion too early creates risk.
Deletion too late creates exposure.
Effective deletion requires knowing where data is stored.
This may include:
Information often exists in more places than expected.
Deletion methods should reflect:
Methods may include:
Simple deletion is rarely sufficient for sensitive information.
Annex A 8.10 expects organisations to ensure information:
The level of irreversibility should be proportionate to the information risk.
Deletion should not focus only on primary records.
Organisations should consider:
Residual data is a common source of exposure.
Where risk justifies it, organisations should:
Records provide:
Assumed deletion is not defensible deletion.
Where deletion is performed by suppliers or service providers, organisations should:
This is particularly relevant for:
Outsourced deletion remains organisational risk.
Annex A 8.10 strongly supports secure deletion when:
Decommissioning is a high-risk moment for data exposure.
Information deletion should align with:
Deletion and disposal are linked — but not the same.
Annex A 8.10 does not require:
It does require organisations to:
Data that “might be useful one day” is often the data that causes incidents.
Most data exposure comes from old data, not active systems.
Annex A 8.10 is about reducing risk by removing unnecessary information.
When information deletion is managed effectively:
Information security is not just about protection.
It is also about knowing when to let data go.
Annex A 8.10 ensures organisations do exactly that — securely and deliberately.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today