Data Retention Policies: Keep What You Need, Destroy What You Do Not

Over-retention is a security risk. Learn how to build retention policies that reduce breach impact and satisfy compliance requirements.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Every byte of data you retain is a byte an attacker can steal. Most organizations keep data far longer than required because deleting things feels risky. But over-retention creates legal liability, increases breach impact, and inflates storage costs. A clear retention policy is not just good housekeeping. It is a security control that directly limits your exposure.

Core Concept Explained Simply

A data retention policy defines how long different types of data should be kept and what happens when that period ends. It balances three competing pressures: legal requirements that mandate minimum retention periods, business needs that require data availability, and security principles that favor minimizing the data you hold.

Retention Schedules

A retention schedule is the operational document that maps each data type to a specific retention period with a documented justification. For example:

  • Employee payroll records: 7 years (IRS requirement)
  • Customer transaction logs: 5 years (PCI DSS and financial regulation)
  • Marketing email lists: Until consent is withdrawn (GDPR)
  • System access logs: 1 year (internal security policy)
  • Expired project files: 90 days after project closure

Each entry needs three things: the data type, the retention period, and the legal or business justification for that period.

Litigation Holds

A litigation hold is a legal directive to preserve all data potentially relevant to pending or anticipated litigation. When a hold is in place, normal retention and deletion schedules are suspended for the affected data. Destroying data subject to a litigation hold is called spoliation and can result in severe legal penalties, including adverse inference rulings and sanctions.

Litigation holds override everything. Your automated deletion system must have a mechanism to pause for affected data.

Retention vs. Archival

Retention defines how long data lives. Archival defines where and how inactive data is stored. Archived data is not exempt from retention policies. When a retention period expires, the data must be destroyed regardless of whether it sits in active storage or an archive.

CISSP Lens

For the CISSP exam, understand these key points:

  • Retention is both a compliance control and a security control. Shorter retention periods reduce breach impact.
  • Litigation holds override normal retention schedules. This is a frequently tested concept.
  • Retention policies must account for all copies of data, including backups, replicas, and disaster recovery copies. A backup tape containing data past its retention period is a compliance and security liability.
  • The data owner, in consultation with legal and compliance, determines the appropriate retention period. IT implements the policy but does not set the schedule.

The exam may present scenarios where retention and legal hold conflict. The correct answer always prioritizes the litigation hold.

Real-World Scenario

A mid-size law firm had a policy (in practice, a habit) of keeping every client email since 2008. Storage was cheap, and partners felt uncomfortable deleting anything that might someday be relevant. When the firm experienced a ransomware attack that included data exfiltration, the attacker stole 15 years of privileged attorney-client communications.

Post-breach analysis revealed that 80% of the exfiltrated data was past its required retention period. If the firm had enforced a reasonable retention schedule (for example, 3 years after matter closure for general correspondence), the breach impact would have been dramatically smaller. The stolen data would have contained only recent matters instead of a decade and a half of client secrets.

The firm implemented a retention overhaul: a formal schedule developed with input from practice group leaders, a litigation hold process integrated with their case management system, and automated deletion enforced at the email server level. The first sweep deleted 4.2 terabytes of expired data.

Common Mistakes and Misconceptions

  • Keep everything forever. "Storage is cheap" ignores that every retained byte is a liability. Breach impact, legal discovery scope, and regulatory exposure all increase with retained volume.
  • No cloud or SaaS coverage. Retention policies that cover on-premises databases but ignore Salesforce, Google Workspace, Slack, and other SaaS platforms leave massive blind spots.
  • Forgetting backup tapes. If your production database deletes records at the 5-year mark but your backup tapes retain those records for 10 years, you have not actually met the retention policy. Backups count.
  • No litigation hold process. Without a documented procedure for pausing deletion, organizations risk spoliation penalties when holds are issued.
  • IT-only retention decisions. Retention periods require input from legal, compliance, and business units. IT should implement and enforce, not decide.

Actionable Checklist

  • Inventory all data repositories and map them to retention requirements
  • Create a retention schedule with input from legal, compliance, and business leaders
  • Implement automated deletion for data past its retention period
  • Document a litigation hold process that pauses automated deletion for affected data
  • Include cloud and SaaS data in your retention scope
  • Address backup and disaster recovery copies in retention planning
  • Review and update retention schedules annually or when regulations change
  • Train staff on retention obligations and the consequences of unauthorized retention or deletion

Key Takeaways

  • Retention policies reduce breach impact by limiting what can be stolen
  • Every data type needs a defined retention period with a documented justification
  • Litigation holds are mandatory overrides that must be planned for in advance
  • Backups and copies count and must follow the same retention rules
  • Automated enforcement prevents retention policies from becoming shelfware

Exam-Style Reflection Question

An organization receives a litigation hold notice. Their automated retention system is scheduled to delete relevant records next week. What should happen?

The automated deletion must be immediately suspended for all data covered by the litigation hold. Destroying data subject to a litigation hold is spoliation and can result in severe legal penalties. The hold takes precedence over the retention schedule until legal counsel releases it.

© 2025 Threat On The Wire. All rights reserved.