ISO 27001:2022 Annex A Control 7.14

Secure Disposal or Re-Use of Equipment

Book a demo

bottom,view,of,modern,skyscrapers,in,business,district,against,blue

IT equipment that is no longer needed must be either destroyed, returned to the leaser, passed to a third party, recycled, or reused for other business operations.

Organisations should safeguard information and licensed software by ensuring it is wiped off or overwritten prior to disposal or reuse of the equipment. This will help protect the confidentiality of the data stored on the device.

If an organisation employs an external IT asset disposal service provider to transfer outdated laptops, printers and external drives, this provider may gain unauthorised access to data hosted on the equipment.

ISO 27001:2022 Annex A 7.14 deals with how organisations can preserve the confidentiality of data stored on equipment designated for disposal or reuse, by implementing effective security measures and procedures.

Purpose of ISO 27001:2022 Annex A 7.14

ISO 27001:2022 Annex A 7.14 enables organisations to preclude unauthorised access to delicate data by verifying that all information and software licensed on equipment is irrevocably erased or overwritten before the equipment is discarded or handed to a third party for reuse.

Ownership of Annex A 7.14

In compliance with ISO 27001:2022 Annex A 7.14, an organisation-wide data disposal-reuse procedure must be established, including the identification of all equipment and the implementation of suitable technical disposal mechanisms and reuse processes.

The Chief Information Officer should be accountable for setting up, enacting, and sustaining systems and processes for discarding and re-utilising equipment.

Guidance on ISO 27001:2022 Annex A 7.14 Compliance

ISO 27001:2022 Annex A 7.14 specifies four essential considerations for compliance that organisations should bear in mind:

Adopting a Proactive Stance Is Advisable

Prior to disposal or reuse, organisations must ascertain whether the equipment includes any information assets and licensed software and ensure these are permanently erased.

Physical Destruction or Irretrievable Erasure of Data

ISO 27001:2022 Annex A 7.14 states that two approaches can be taken to ensure secure and permanent erasure of information on equipment:

  1. Equipment that holds storage media devices that contain information should be physically destroyed.
  2. Organisations should refer to Annex A 7.10 and Annex A 8.10 concerning Storage Media and Information Deletion, respectively, in order to ensure all data stored on equipment is erased, overwritten or destroyed in a manner that precludes retrieval by malicious parties.

All Labels and Markings Should Be Taken Off

Equipment components and the data they contain can be labelled or marked to identify the organisation or reveal the asset owner, network, or classification level of the information. All these labels and markings should be permanently destroyed.

Removal of Controls

Organisations may consider uninstalling security controls, such as access restrictions or surveillance systems, when vacating facilities, given the following conditions:

  • The lease agreement stipulates the requirements for the return of the property.
  • Mitigating the risk of any unauthorised access to sensitive information by the future tenant is essential.
  • Can the current controls be utilised at the upcoming facility.

Supplementary Guidance on Annex A 7.14

In addition to the General Guidance, ISO 27001:2022 Annex A 7.14 provides three specific recommendations for organisations.

Damaged Equipment

When equipment containing data is sent for repairs, it may be vulnerable to unauthorised access from third parties.

Organisations should perform a risk evaluation, taking into account the level of sensitivity of the data, and contemplate if destroying the equipment would be a more viable choice than repair.

Full-Disk Encryption

Ensuring full-disk encryption meets the highest standards is essential to safeguarding the confidentiality of data. It should be noted that the following ought to be adhered to:

  • Encryption is reliable and safeguards every aspect of the disk, including leftover space.
  • Cryptographic keys should be of length sufficient to thwart brute force attacks.
  • Organisations should protect the secrecy of their cryptographic keys. For instance, the encryption key should not be stored on the same hard drive.

Overwriting Tools

Organisations should select an overwriting approach while considering the following criteria:

  • The information asset has been granted a certain level of classification.
  • The type of storage media where the information is kept is known.

Changes and Differences from ISO 27001:2013

ISO 27001:2022 Annex A 7.14 replaces ISO 27001:2013 Annex A 11.2.7 in the revised standard. The ISO 27001:2022 version replaces the ISO 27001:2013 version of the standard, with the most recent version including updates to Annex A 7.14.

ISO 27001:2022 Annex A 7.14 is much like its 2013 equivalent. However, the 2022 version has more comprehensive requirements in the general guidance.

In comparison to ISO 27001:2013, the 2022 version brings these demands:

  • Organisations should erase all signs and tags that specify their organisation, network, and classification level.
  • Organisations should contemplate eliminating any controls they have established at a facility when they depart.

Table of All ISO 27001:2022 Annex A Controls

In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.

ISO 27001:2022 Organisational Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Organisational ControlsAnnex A 5.1Annex A 5.1.1
Annex A 5.1.2
Policies for Information Security
Organisational ControlsAnnex A 5.2Annex A 6.1.1Information Security Roles and Responsibilities
Organisational ControlsAnnex A 5.3Annex A 6.1.2Segregation of Duties
Organisational ControlsAnnex A 5.4Annex A 7.2.1Management Responsibilities
Organisational ControlsAnnex A 5.5Annex A 6.1.3Contact With Authorities
Organisational ControlsAnnex A 5.6Annex A 6.1.4Contact With Special Interest Groups
Organisational ControlsAnnex A 5.7NEWThreat Intelligence
Organisational ControlsAnnex A 5.8Annex A 6.1.5
Annex A 14.1.1
Information Security in Project Management
Organisational ControlsAnnex A 5.9Annex A 8.1.1
Annex A 8.1.2
Inventory of Information and Other Associated Assets
Organisational ControlsAnnex A 5.10Annex A 8.1.3
Annex A 8.2.3
Acceptable Use of Information and Other Associated Assets
Organisational ControlsAnnex A 5.11Annex A 8.1.4Return of Assets
Organisational ControlsAnnex A 5.12Annex A 8.2.1Classification of Information
Organisational ControlsAnnex A 5.13Annex A 8.2.2Labelling of Information
Organisational ControlsAnnex A 5.14Annex A 13.2.1
Annex A 13.2.2
Annex A 13.2.3
Information Transfer
Organisational ControlsAnnex A 5.15Annex A 9.1.1
Annex A 9.1.2
Access Control
Organisational ControlsAnnex A 5.16Annex A 9.2.1Identity Management
Organisational ControlsAnnex A 5.17Annex A 9.2.4
Annex A 9.3.1
Annex A 9.4.3
Authentication Information
Organisational ControlsAnnex A 5.18Annex A 9.2.2
Annex A 9.2.5
Annex A 9.2.6
Access Rights
Organisational ControlsAnnex A 5.19Annex A 15.1.1Information Security in Supplier Relationships
Organisational ControlsAnnex A 5.20Annex A 15.1.2Addressing Information Security Within Supplier Agreements
Organisational ControlsAnnex A 5.21Annex A 15.1.3Managing Information Security in the ICT Supply Chain
Organisational ControlsAnnex A 5.22Annex A 15.2.1
Annex A 15.2.2
Monitoring, Review and Change Management of Supplier Services
Organisational ControlsAnnex A 5.23NEWInformation Security for Use of Cloud Services
Organisational ControlsAnnex A 5.24Annex A 16.1.1Information Security Incident Management Planning and Preparation
Organisational ControlsAnnex A 5.25Annex A 16.1.4Assessment and Decision on Information Security Events
Organisational ControlsAnnex A 5.26Annex A 16.1.5Response to Information Security Incidents
Organisational ControlsAnnex A 5.27Annex A 16.1.6Learning From Information Security Incidents
Organisational ControlsAnnex A 5.28Annex A 16.1.7Collection of Evidence
Organisational ControlsAnnex A 5.29Annex A 17.1.1
Annex A 17.1.2
Annex A 17.1.3
Information Security During Disruption
Organisational ControlsAnnex A 5.30NEWICT Readiness for Business Continuity
Organisational ControlsAnnex A 5.31Annex A 18.1.1
Annex A 18.1.5
Legal, Statutory, Regulatory and Contractual Requirements
Organisational ControlsAnnex A 5.32Annex A 18.1.2Intellectual Property Rights
Organisational ControlsAnnex A 5.33Annex A 18.1.3Protection of Records
Organisational ControlsAnnex A 5.34 Annex A 18.1.4Privacy and Protection of PII
Organisational ControlsAnnex A 5.35Annex A 18.2.1Independent Review of Information Security
Organisational ControlsAnnex A 5.36Annex A 18.2.2
Annex A 18.2.3
Compliance With Policies, Rules and Standards for Information Security
Organisational ControlsAnnex A 5.37Annex A 12.1.1Documented Operating Procedures

ISO 27001:2022 People Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
People ControlsAnnex A 6.1Annex A 7.1.1Screening
People ControlsAnnex A 6.2Annex A 7.1.2Terms and Conditions of Employment
People ControlsAnnex A 6.3Annex A 7.2.2Information Security Awareness, Education and Training
People ControlsAnnex A 6.4Annex A 7.2.3Disciplinary Process
People ControlsAnnex A 6.5Annex A 7.3.1Responsibilities After Termination or Change of Employment
People ControlsAnnex A 6.6Annex A 13.2.4Confidentiality or Non-Disclosure Agreements
People ControlsAnnex A 6.7Annex A 6.2.2Remote Working
People ControlsAnnex A 6.8Annex A 16.1.2
Annex A 16.1.3
Information Security Event Reporting

ISO 27001:2022 Physical Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Physical ControlsAnnex A 7.1Annex A 11.1.1Physical Security Perimeters
Physical ControlsAnnex A 7.2Annex A 11.1.2
Annex A 11.1.6
Physical Entry
Physical ControlsAnnex A 7.3Annex A 11.1.3Securing Offices, Rooms and Facilities
Physical ControlsAnnex A 7.4NEWPhysical Security Monitoring
Physical ControlsAnnex A 7.5Annex A 11.1.4Protecting Against Physical and Environmental Threats
Physical ControlsAnnex A 7.6Annex A 11.1.5Working In Secure Areas
Physical ControlsAnnex A 7.7Annex A 11.2.9Clear Desk and Clear Screen
Physical ControlsAnnex A 7.8Annex A 11.2.1Equipment Siting and Protection
Physical ControlsAnnex A 7.9Annex A 11.2.6Security of Assets Off-Premises
Physical ControlsAnnex A 7.10Annex A 8.3.1
Annex A 8.3.2
Annex A 8.3.3
Annex A 11.2.5
Storage Media
Physical ControlsAnnex A 7.11Annex A 11.2.2Supporting Utilities
Physical ControlsAnnex A 7.12Annex A 11.2.3Cabling Security
Physical ControlsAnnex A 7.13Annex A 11.2.4Equipment Maintenance
Physical ControlsAnnex A 7.14Annex A 11.2.7Secure Disposal or Re-Use of Equipment

ISO 27001:2022 Technological Controls

Annex A Control TypeISO/IEC 27001:2022 Annex A IdentifierISO/IEC 27001:2013 Annex A IdentifierAnnex A Name
Technological ControlsAnnex A 8.1Annex A 6.2.1
Annex A 11.2.8
User Endpoint Devices
Technological ControlsAnnex A 8.2Annex A 9.2.3Privileged Access Rights
Technological ControlsAnnex A 8.3Annex A 9.4.1Information Access Restriction
Technological ControlsAnnex A 8.4Annex A 9.4.5Access to Source Code
Technological ControlsAnnex A 8.5Annex A 9.4.2Secure Authentication
Technological ControlsAnnex A 8.6Annex A 12.1.3Capacity Management
Technological ControlsAnnex A 8.7Annex A 12.2.1Protection Against Malware
Technological ControlsAnnex A 8.8Annex A 12.6.1
Annex A 18.2.3
Management of Technical Vulnerabilities
Technological ControlsAnnex A 8.9NEWConfiguration Management
Technological ControlsAnnex A 8.10NEWInformation Deletion
Technological ControlsAnnex A 8.11NEWData Masking
Technological ControlsAnnex A 8.12NEWData Leakage Prevention
Technological ControlsAnnex A 8.13Annex A 12.3.1Information Backup
Technological ControlsAnnex A 8.14Annex A 17.2.1Redundancy of Information Processing Facilities
Technological ControlsAnnex A 8.15Annex A 12.4.1
Annex A 12.4.2
Annex A 12.4.3
Logging
Technological ControlsAnnex A 8.16NEWMonitoring Activities
Technological ControlsAnnex A 8.17Annex A 12.4.4Clock Synchronization
Technological ControlsAnnex A 8.18Annex A 9.4.4Use of Privileged Utility Programs
Technological ControlsAnnex A 8.19Annex A 12.5.1
Annex A 12.6.2
Installation of Software on Operational Systems
Technological ControlsAnnex A 8.20Annex A 13.1.1Networks Security
Technological ControlsAnnex A 8.21Annex A 13.1.2Security of Network Services
Technological ControlsAnnex A 8.22Annex A 13.1.3Segregation of Networks
Technological ControlsAnnex A 8.23NEWWeb filtering
Technological ControlsAnnex A 8.24Annex A 10.1.1
Annex A 10.1.2
Use of Cryptography
Technological ControlsAnnex A 8.25Annex A 14.2.1Secure Development Life Cycle
Technological ControlsAnnex A 8.26Annex A 14.1.2
Annex A 14.1.3
Application Security Requirements
Technological ControlsAnnex A 8.27Annex A 14.2.5Secure System Architecture and Engineering Principles
Technological ControlsAnnex A 8.28NEWSecure Coding
Technological ControlsAnnex A 8.29Annex A 14.2.8
Annex A 14.2.9
Security Testing in Development and Acceptance
Technological ControlsAnnex A 8.30Annex A 14.2.7Outsourced Development
Technological ControlsAnnex A 8.31Annex A 12.1.4
Annex A 14.2.6
Separation of Development, Test and Production Environments
Technological ControlsAnnex A 8.32Annex A 12.1.2
Annex A 14.2.2
Annex A 14.2.3
Annex A 14.2.4
Change Management
Technological ControlsAnnex A 8.33Annex A 14.3.1Test Information
Technological ControlsAnnex A 8.34Annex A 12.7.1Protection of Information Systems During Audit Testing

How ISMS.online Help

ISMS.Online provides a comprehensive approach to ISO 27001:2022 implementation. It offers a streamlined process, allowing users to quickly and effectively meet the standards of the international security standard. With its user-friendly interface, it makes it easy for organisations to establish and maintain a robust Information Security Management System.

This web-based system enables you to demonstrate that your ISMS meets the specified criteria, through effective processes, procedures and checklists.

Contact us now to arrange a demonstration.

Our recent success achieving ISO 27001, 27017 & 27018 certification was in large part down to ISMS.online.

Karen burton
Security Analyst, Thrive Health

Book your demo

Get a Headstart on ISO 27001
  • All updated with the 2022 control set
  • Make 81% progress from the minute you log in
  • Simple and easy to use
Book your demo
img

Streamline your workflow with our new Jira integration! Learn more here.