3.4
IG1 IG2 IG3

Enforce Data Retention

Control Group: 3. Data Protection
Asset Type: Data
Security Function: Protect

Description

Retain data according to the enterprise’s data management process. Data retention must include both minimum and maximum timelines.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Draft policy/procedure document
7
Obtain stakeholder review and approval
8
Communicate to affected personnel
9
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Stale Data Targeted in Breach

Confidentiality

Data retained beyond its useful life provides attackers with a larger trove of sensitive information during a breach, including historical records that should have been purged.

Litigation Risk from Over-Retention

Confidentiality

Data retained beyond legal hold or regulatory requirements becomes a liability, subject to discovery in legal proceedings where the organization would prefer the data had been disposed.

Vulnerabilities (When Safeguard Absent)

No Defined Data Retention Timelines

Without minimum and maximum retention periods, data accumulates indefinitely, expanding the attack surface and increasing regulatory exposure.

No Automated Enforcement of Retention Policies

Without enforced retention schedules, data deletion depends on individual judgment, leading to inconsistent practices and perpetual data hoarding.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Document Governing policy document (current, approved, communicated) Reviewed annually