Data leakage protection according to ISO 27001:2022 — Control 8.12

Written By
Patrik Björklund
Patrik Björklund
Published
August 20, 2025
Topic
Data Leakage

ISO 27001 control 8.12 requires organizations to prevent unauthorized access, transmission, or extraction of information. Many companies still don't have a complete understanding of what this means in practice.

What is data leakage?

Data leakage means that information is accessed, transmitted, or extracted by unauthorized persons or systems - both internal and external. This includes:

Insider threats:

  • Employees copying customer data to personal devices
  • Staff sending trade secrets to competitors
  • Personnel taking sensitive information when they leave
  • Unintentional sharing of confidential documents

External threats:

  • Cybercriminals stealing data through breaches
  • Hackers exploiting vulnerabilities to access information
  • Malicious software extracting data automatically
  • Industrial espionage from competitors

System-related leakage:

  • Misconfigured databases exposing information
  • Insecure APIs leaking data
  • Backup systems without encryption
  • Cloud services with inadequate access controls

What does control 8.12 require?

Control 8.12 states that organizations shall apply data leakage prevention measures to systems, networks, and any other devices that process, store, or transmit sensitive information.

This means you must:

  • Prevent unauthorized access to sensitive information
  • Detect when someone attempts to access or copy protected data
  • Block unauthorized transmission of information
  • Monitor both internal employees and external systems
  • Respond quickly when potential leakages are detected

Technical protection layers

The question that often comes up is "How do we protect ourselves?" and thoughts immediately turn to technical tools. Below we have a list of various tools available to do this. But - read on - it's deeper than that.

Mimecast Incydr, Endpoint Protector, Teramind, and Microsoft Purview are all examples of technical solutions for handling insider threats.

But you also need to protect against external threats and ensure you have control over what your systems can do. Tools like Forcepoint, Zscaler, Netscope, Microsoft Defender, etc., come into scope here.

After that, you might start considering solutions like Symantec Data Loss Prevention or IBM Guardium.

In short - the list of vendors that can deliver technical solutions is long, and exactly what suits you should be based on a risk analysis - not because it's technically impressive.

What you should do before considering system protection

Documentation and governance

Technical solutions must be complemented with:

  • Policies defining what is permitted and prohibited
  • Procedures for handling sensitive information
  • Training on both internal and external threats
  • Incident handling when leakages are detected
  • Regular risk assessment of new threats

Identify information assets

Map what sensitive information you handle:

  • Personal data and GDPR data
  • Trade secrets and intellectual property
  • Financial information and PCI data
  • Technical documentation and source code

Analyze the threat landscape

Understand where threats come from:

  • Which employees have access to sensitive data?
  • Which external parties can reach your systems?
  • What technical vulnerabilities exist?
  • What do your data flows look like?

Tip: With AmpliFlow, you can easily document and follow up on all these parts according to ISO 27001 requirements. This is where you conduct governance of the technical solutions.

Implement protection layers

Only now is it time to start thinking about building technical defense in depth:

  • Preventive measures: Access control and encryption
  • Detective measures: Monitoring and logging
  • Responsive measures: Automatic blocking and incident handling

It's also wise to ensure the protection works and make these things a recurring part of how you work with information security:

  • Conduct penetration tests
  • Simulate insider threat scenarios
  • Test incident handling processes
  • Validate that legitimate business is not affected

FAQ - Frequently Asked Questions

Must we buy expensive technical solutions to comply with control 8.12?

No, not necessarily. ISO 27001 doesn't require specific technical products. You can implement data leakage prevention through a combination of:

  • Policies and procedures that limit how sensitive data may be handled
  • Training that teaches employees to identify and avoid risks
  • Organizational measures like access control and authorization management
  • Existing tools already present in your systems

Example: Instead of buying Google DLP, you can create rules that sensitive data may not be stored in Google Drive, or only allow specific folders with restricted access.

We don't have budget for technical DLP solutions. Will we still pass the audit?

Yes, if you handle the risk correctly. Follow these steps:

  1. Document the risk - describe what could happen if data leaks
  2. Calculate cost vs. benefit - show that the DLP investment is greater than the potential damage
  3. Get management approval - the top executive must formally accept the risk
  4. Implement alternative measures through policies and procedures

This is called risk acceptance and is completely permitted under ISO 27001.

Is it sufficient with policies and procedures for data leakage prevention?

It depends on your risk profile. Ask yourself:

  • What type of sensitive data do you handle?
  • How large is the potential damage from leakage?
  • What threats do you face (internal vs. external)?
  • Are there regulatory requirements (GDPR, patient data laws)?

For many smaller companies, well-written policies combined with training and basic technical measures are sufficient. Larger organizations with highly sensitive data usually need more advanced technical solutions.

How do we document data leakage prevention in AmpliFlow?

Below are non-exhaustive examples (there are of course many ways to do it that suit your specific needs) of how you can solve it by simply documenting using pages in AmpliFlow:

Information classification policy:

  • Define what counts as sensitive data
  • Rules for handling different information types
  • Requirements for labeling and protecting documents

IT security policy:

  • Rules for internet use and email
  • Permitted communication channels for sensitive data
  • Requirements for passwords and access protection

Security procedures for IT department:

  • Procedures for network monitoring
  • Log review routines
  • Incident handling process

Risk register:

  • Identified data leakage risks
  • Selected measures or risk acceptance
  • Follow-up and regular reassessment

What happens if we don't implement control 8.12 at all?

This is not an option. Control 8.12 is mandatory in ISO 27001. You must either:

  • Implement the control through technical or organizational measures
  • Formally accept the risk with management approval
  • Show that the control is not relevant to your business (very uncommon)

Completely ignoring the control will result in failing the audit.

How often must we update our data leakage prevention?

Regularly, at least annually. Check:

  • New threats and vulnerabilities that may affect you
  • Changes in the business that create new risks
  • Updates to regulations that affect requirements
  • Effectiveness of existing measures
  • New technical possibilities that can improve protection

Document all changes in your management system and ensure employees receive updated training.

Common mistakes

  • Only focusing on external threats: Studies show that the majority of data leakages come from insiders
  • Forgetting third parties: Suppliers and partners can also pose risks
  • Not monitoring privileged users: IT administrators and managers need extra monitoring
  • Missing mobile devices: Smartphones often contain as sensitive data as computers

Next steps

  1. Conduct a threat analysis - identify both internal and external risks
  2. Map information flows - understand how data moves in the organization
  3. Prioritize protective measures based on risk and impact
  4. Document everything in your management system according to ISO 27001 requirements
  5. Select technical solutions that cover all identified threats

Data leakage prevention according to ISO 27001 requires a holistic approach where you protect against both well-meaning employees who make mistakes and malicious actors who actively try to steal your information.

Gratis e-bok
Allt från vad standarder kräver till hur du genomför ett projekt för att etablera ett certifierbart ledningssystem.
Tack! Nu får du snart ett e-post från oss!
Oj! 

Något gick fel.

Hör av dig till support@ampliflow.com.
Free e-book
Everything from what standards require to how you implement a project to establishing a certifiable management system.
Tack! Nu får du snart ett e-post från oss!
Oj! 

Något gick fel.

Hör av dig till support@ampliflow.com.
Do you need help getting ready for ISO certification?
AmpliFlow can help you with everything you need to achieve certification. From smart IT systems to project management, training, internal auditing and much more. Book an appointment today to find out more!
Thank you! We will hear from you soon!
Oops!

Something went wrong.

Get in touch with support@ampliflow.com.
Articles

More articles

Tools, information and other resources you need.
Ledarskap

Psychological safety: what it is and what you as a business leader need to know

Explore psychological safety and its significance for business leaders. Learn how openness, mistakes, and feedback foster a culture of innovation and engagement. Become a better leader today!
Patrik Björklund
May 5, 2025
IT Tools

What IT system do I need to build an ISO certificated management system?

To build an ISO certifiable management system, you need IT systems that can handle documentation, processes and results according to the requirements set by the standard. This can be an ERP system, a specialized QMS system, or something that integrates with other systems.
Joakim Stenström
May 24, 2023
Risk management

What is operational risk management?

Master Operational Risk Management: An overview of operational risk management within ISO 9001/14001/45001 and ISO 31000.
Joakim Stenström
September 28, 2023

Do like other happy customers - get AmpliFlow

Schedule a meeting today to discuss how we can help you with systems and/or support.
Small or publicly traded. Recruitment or concrete manufacturing. AmpliFlow is for everyone.