Asset Retention
Why Retention Is a Governance Problem
A financial services firm kept email backups for 15 years — long past any regulatory requirement. When litigation arrived, opposing counsel demanded discovery of the entire archive. The cost of reviewing 15 years of email exceeded the settlement value of the case.
Keeping data too long is a liability. Destroying data too early is a compliance violation. The security manager's job is not to hoard everything or delete everything — it is to ensure the organization retains exactly what it must, for exactly as long as it must, and destroys it verifiably when the retention period ends.
The CISSP exam treats retention as a governance decision that intersects legal, regulatory, and business requirements. Technical implementation matters, but the questions focus on the policies and decisions that drive it.
Retention Policies and Schedules
A retention policy defines what data types the organization keeps, how long it keeps them, and when destruction occurs. A retention schedule is the implementation — a detailed mapping of data categories to specific retention periods.
Retention periods come from three sources, and when they conflict, the longest applicable period wins:
- Regulatory requirements — Laws and regulations mandate minimum retention periods. HIPAA requires medical records to be retained for six years from date of creation or last effective date. SOX requires financial audit records for seven years. Tax records typically require seven years. These minimums are non-negotiable.
- Legal requirements — Pending or anticipated litigation can override retention schedules through legal holds. Contractual obligations may also specify retention periods.
- Business requirements — The organization may need data beyond regulatory minimums for operational, analytical, or strategic purposes. Business retention must be documented and justified.
The retention schedule must be reviewed regularly. New regulations, new data types, and changes in business operations all affect what must be retained and for how long.
Legal Hold (Litigation Hold)
A legal hold is a directive to preserve all data potentially relevant to pending or reasonably anticipated litigation, audit, or government investigation. When a legal hold is issued, all normal retention and destruction activities stop for the affected data.
This is the single most tested retention concept on the CISSP exam. The rules are absolute:
- A legal hold overrides the retention schedule. Data that would normally be destroyed must be preserved.
- The hold must be communicated to all custodians of potentially relevant data — including IT, business units, and third-party service providers who store organizational data.
- Automated deletion processes must be suspended for affected data. If a system automatically purges records after 90 days, that automation must be paused for data under hold.
- Failure to preserve data under legal hold constitutes spoliation of evidence, which carries severe legal penalties including adverse inference (the court assumes the destroyed data was harmful to your case).
Legal holds originate from the legal department, not from IT or security. The security manager's role is to ensure the technical capability to implement holds exists and that the process is followed when activated.
Records Management
Records management is the systematic control of records throughout their lifecycle: creation, maintenance, use, and disposition. It differs from general data management because records have specific characteristics:
- Records are evidence — They document business transactions, decisions, and activities. Their integrity must be maintained.
- Records have defined retention — Each record type maps to a specific retention period based on its regulatory, legal, or business classification.
- Records have controlled disposition — Records are not casually deleted. Disposition follows the retention schedule and is documented.
A records management program requires a records inventory (what records exist), a classification scheme (what retention applies), and a disposition process (how records are destroyed when retention expires).
For the exam, records management is the governance layer that makes retention policies operational. Without records management, retention policies are aspirational documents with no mechanism for enforcement.
End-of-Life and Disposal Procedures
When the retention period expires and no legal hold applies, data must be destroyed. The destruction method must match the data's classification and the storage medium:
Logical destruction:
- Cryptographic erasure — Destroy the encryption keys for encrypted data, rendering the data unrecoverable. Fast and effective for encrypted storage, increasingly common for cloud environments where physical access is impossible.
- Overwriting — Write new data patterns over the existing data. Suitable for magnetic media. Multiple passes may be required depending on the classification level and regulatory requirements.
- Secure erase — Built-in firmware commands that instruct storage devices to clear all data blocks. Effective for SSDs where overwriting is unreliable due to wear leveling.
Physical destruction:
- Degaussing — A strong magnetic field that erases magnetic media (tapes, hard drives). Does not work on SSDs or optical media. Renders the media unusable.
- Shredding — Physical destruction of the storage medium into small fragments. Suitable for any media type. Required for the highest classification levels.
- Incineration — Complete physical destruction through burning. Used for the most sensitive materials.
Regardless of method, destruction must be documented. A certificate of destruction records what was destroyed, when, how, and by whom. For regulated data, this documentation may be required during audits.
Backup and Tape Retention
Backup media creates a retention challenge that organizations frequently overlook. A nightly backup captures a snapshot of all data, including data that should have been destroyed per the retention schedule.
Key governance considerations for backup retention:
- Backup retention periods should be shorter than or equal to the longest data retention requirement on the backed-up systems
- Legal holds must extend to backup media — if production data is under hold, backups containing that data are also under hold
- Backup tapes stored offsite must be included in destruction schedules — forgetting about tapes in an offsite vault is a common compliance gap
- Cloud backups require the same retention governance as on-premises backups, with the additional consideration that deletion from a cloud provider must be verified
Jurisdictional Retention Conflicts
Multinational organizations face a specific challenge: different jurisdictions may impose conflicting retention requirements for the same data type.
One country's privacy law may require deletion of personal data after two years. Another country's financial regulation may require retention of the same data for seven years. If the data is subject to both jurisdictions, the organization faces a direct conflict.
The general principle: when retention requirements conflict, retain for the longer period unless doing so violates a specific prohibition in the shorter jurisdiction. When genuine conflicts exist (one law requires retention while another requires deletion), engage legal counsel for a jurisdiction-specific analysis. Document the conflict, the analysis, and the decision.
The CISSP exam does not expect you to know specific laws for every country. It expects you to recognize when a jurisdictional conflict exists and to follow a structured decision process: identify the conflict, engage legal, document the decision, implement controls.
Pattern Recognition
Retention questions on the CISSP follow these patterns:
- "Litigation is pending and the retention schedule says delete" → Legal hold overrides the schedule. Preserve the data.
- "Two regulations require different retention periods" → Retain for the longer period unless a specific prohibition applies
- "How do we verify data was properly destroyed?" → Certificate of destruction documenting what, when, how, and by whom
- "Backup tapes from three years ago contain data that was deleted from production" → Backup retention gap. Tapes must follow the same retention schedule as production data.
- "The organization keeps everything forever just in case" → Excessive retention increases liability, storage costs, and discovery burden
Trap Patterns
- "Keep everything in case of litigation" — Over-retention increases discovery costs and liability. Retain according to the schedule; implement legal holds when litigation is pending or anticipated.
- "The retention schedule can be paused during a system migration" — Retention obligations do not pause for operational convenience. Data must be protected throughout any migration, and retention clocks continue to run.
- "Deleting data from the production database fulfills the destruction requirement" — If backups, replicas, or archives contain the same data, destruction is incomplete until all copies are addressed.
- "Degaussing works for all storage media" — Degaussing works for magnetic media only. SSDs require secure erase or physical destruction. Optical media requires shredding or incineration.
Scenario Practice
Question 1
An organization receives notice that a former customer has filed a lawsuit alleging data mishandling. The retention schedule calls for customer data to be deleted 12 months after the account closes. This customer's account closed 10 months ago.
What should the organization do?
A. Proceed with scheduled deletion at the 12-month mark
B. Issue a legal hold to preserve all data related to the former customer
C. Delete the data immediately to limit exposure
D. Transfer the data to the legal department for safekeeping
Answer & reasoning
Correct: B
Pending litigation triggers a legal hold that overrides the retention schedule. All data potentially relevant to the lawsuit must be preserved regardless of what the schedule dictates. Deleting data during litigation constitutes spoliation of evidence.
Question 2
A company operates in the EU and the United States. EU privacy regulations require that employee personal data be deleted within two years of the employee's departure. US tax regulations require that payroll records be retained for seven years.
How should the organization handle employee payroll data?
A. Delete all data after two years to comply with EU requirements
B. Retain for seven years to satisfy the longer requirement, ensuring the data is protected throughout
C. Maintain two separate databases with different retention periods
D. Ignore the EU requirement since the US requirement is longer
Answer & reasoning
Correct: B
When retention requirements conflict, retain for the longer period unless a specific prohibition applies. Tax regulations mandate seven-year retention. The organization should retain the data for seven years with appropriate security controls, and document the legal basis for the longer retention period under the applicable GDPR exemption for legal obligations.
Question 3
During an audit, the compliance team discovers that backup tapes from decommissioned servers are still stored in an offsite vault. The tapes contain customer data subject to a three-year retention policy. The servers were decommissioned five years ago.
What is the MOST appropriate action?
A. Continue storing the tapes indefinitely as a precaution
B. Verify no legal holds apply, then destroy the tapes following proper procedures and document the destruction
C. Return the tapes to the original server room
D. Overwrite the tapes and reuse them for current backups
Answer & reasoning
Correct: B
The data has exceeded its three-year retention period by two years. The first step is confirming no legal hold supersedes the schedule. Once confirmed, the tapes should be destroyed using a method appropriate for the media type and classification, with a certificate of destruction documenting the process.
Key Takeaway
Retention governance comes down to three questions, always in this order:
- Is the data under legal hold? If yes, preserve it regardless of the retention schedule.
- Has the retention period expired? If not, maintain protection proportional to the data's classification.
- When retention expires, can you verify destruction across all copies? If not, the obligation has not been met.
Over-retention creates liability. Under-retention creates violations. The right answer is always a documented, enforceable schedule that accounts for regulatory requirements, legal obligations, and business needs — with a legal hold process ready to override it when needed.