Most data loss doesn’t involve hackers breaking in.
It involves data quietly leaving through channels nobody was watching.
Annex A 8.12 exists to ensure organisations prevent, detect, and control unauthorised data leakage, whether caused by people, systems, or malicious activity.
This control is about stopping sensitive information from leaving the organisation unintentionally or without approval.

Annex A 8.12 of ISO 27001:2022 focuses on data leakage prevention (DLP).
At a practical level, this means:
This is a new control in ISO 27001:2022, reflecting modern risks associated with email, cloud services, remote working, and insider activity.
Data leakage occurs when information is:
Common causes include:
Annex A 8.12 ensures organisations treat data movement as a security risk, not just a productivity feature.
A pragmatic approach to Annex A 8.12 typically includes the following elements.
Organisations should identify channels where data commonly leaves the environment, such as:
Controls should focus on realistic leakage paths, not theoretical ones.
Annex A 8.12 relies heavily on understanding data sensitivity.
Organisations should:
Not all information justifies the same level of restriction.
Controls may include:
Restrictions should be risk-based and deliberate, not blanket bans.
Organisations should consider monitoring:
Monitoring supports early detection of:
Monitoring should be proportionate and lawful.
ISO 27001:2022 supports the use of technical DLP tools where justified by risk.
Such tools may:
DLP tools should integrate with data classification and access controls to be effective.
Large-scale exports represent increased risk.
Organisations should consider:
Bulk data loss often causes the most harm.
Annex A 8.12 applies during:
Controls weakened during exceptional activity should be:
Exceptional access is a common leakage window.
Data leakage is frequently caused by insiders, intentionally or otherwise.
Organisations should:
Prevention is as much behavioural as technical.
Annex A 8.12 works closely with:
DLP is ineffective if upstream controls are weak.
Organisations should:
Leakage prevention must adapt as working practices change.
Data leakage prevention controls can be intrusive.
Organisations should ensure:
Poorly implemented DLP can create greater compliance risk than the leakage it is intended to prevent.
Annex A 8.12 does not require:
It does require organisations to:
Most data leakage is accidental — but still damaging.
Data leakage is usually obvious in hindsight.
Annex A 8.12 is about keeping information where it belongs.
When data leakage prevention is implemented effectively:
Information security is not just about stopping access.
It is about controlling what leaves — and how.
Annex A 8.12 ensures organisations do exactly that.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today