ISO 270018 min read

ISO 27018: Protecting Personal Data in the Cloud

ISO 27018 establishes a code of practice for protecting personally identifiable information (PII) in public cloud environments. As more organizations move sensitive data to the cloud, this standard provides essential guidance for cloud service providers and their customers.

Key Takeaways

Point Summary
Purpose Code of practice for PII protection in public cloud
Scope Public cloud PII processors (providers handling customer data)
Prerequisite Requires ISO 27001 certification as foundation
Privacy principles Consent, purpose limitation, minimization, transparency
GDPR alignment Supports data processor obligations under GDPR

Quick Answer: ISO 27018 is a privacy standard for cloud providers that process personal data on behalf of their customers. It builds on ISO 27001 and provides specific controls for protecting personally identifiable information in cloud environments. This helps cloud customers meet their privacy obligations.

Understanding ISO 27018

What Is ISO 27018?

ISO 27018 is formally titled "Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors." In simpler terms, it tells cloud providers how to protect the personal data their customers entrust to them.

The standard focuses specifically on:

Aspect Scope
Environment Public cloud computing
Role PII processors (handling data on behalf of others)
Data type Personally identifiable information
Foundation Extension of ISO 27001/27002

PII Processor vs. PII Controller

Understanding the distinction is crucial:

Role Definition Example
PII Controller Determines purposes and means of PII processing Your company deciding to store customer data
PII Processor Processes PII on behalf of a controller Cloud provider storing your customer data

ISO 27018 addresses the PII processor role. If you use a cloud provider to store or process personal data, that provider is acting as a PII processor for you.

Relationship to Other Standards

ISO 27018 fits within the ISO 27000 family:

Standard Focus Relationship
ISO 27001 Information security management Required foundation
ISO 27002 Security control implementation ISO 27018 builds on this
ISO 27017 Cloud security Complementary (security focus)
ISO 27018 Cloud PII protection Specific to privacy
ISO 27701 Privacy management system Broader privacy scope

When You Need ISO 27018

For Cloud Service Providers

You should consider ISO 27018 if you:

Scenario Why ISO 27018 Helps
Process customer PII Demonstrates privacy commitment
Serve regulated industries Healthcare, finance, government customers expect it
Operate in GDPR jurisdictions Supports processor compliance
Compete with major providers AWS, Azure, GCP all have ISO 27018
Handle sensitive data Shows mature privacy practices

For Cloud Customers

ISO 27018 certification from your provider gives you:

Benefit Value
Due diligence evidence Proof you selected a responsible processor
Contractual baseline Standard expectations for data handling
Regulatory support Helps demonstrate GDPR Article 28 compliance
Risk reduction Provider follows established privacy practices
Audit efficiency Reduces need for direct provider audits

Core Privacy Principles

Consent and Choice

ISO 27018 requires cloud processors to:

Requirement Implementation
Support controller consent mechanisms Technical capabilities for consent management
Not use PII for marketing No secondary use without explicit permission
Respect data subject preferences Technical means to implement choices

Purpose Limitation

Requirement Implementation
Process only as instructed Follow controller's documented instructions
No unauthorized use PII used only for contracted purposes
Clear service definition Documented scope of processing activities

Data Minimization

Requirement Implementation
Collect only necessary PII Limit processing to service requirements
No excessive retention Delete temporary files, logs containing PII
Minimize copies Limit data duplication

Use, Retention, and Disclosure Limitation

Requirement Implementation
Return or delete PII Clear termination procedures
Restrict disclosures Only as authorized or legally required
Document retention Clear retention periods

Transparency

Requirement Implementation
Disclose sub-processors Identify who else processes the data
Data location disclosure Inform where PII is processed
Processing documentation Clear description of activities

Key ISO 27018 Controls

Enhanced Controls from ISO 27002

ISO 27018 enhances existing controls with PII-specific requirements:

Control Area ISO 27018 Enhancement
Access control Ensure only authorized personnel access PII
Cryptography Encrypt PII in transit and at rest
Operations security Secure deletion, backup encryption
Communications security Secure data transfers
Supplier relationships Sub-processor disclosure and management

PII-Specific Controls

ISO 27018 adds controls unique to PII processing:

Consent and Notification

Control Requirement
PII use notification Inform controllers of any third-party disclosures
Advertising prohibition No use of PII for advertising without consent
Sub-processor notification Alert controllers before using sub-processors

PII Return and Disposal

Control Requirement
Return capability Technical means to return PII to controller
Secure deletion Verified destruction when no longer needed
Media disposal Secure handling of storage media
Retention limits Delete PII when retention period expires

Disclosure Handling

Control Requirement
Law enforcement requests Notify controller unless prohibited
Government access Document any legal disclosure requirements
Disclosure logging Record all disclosures made

Data Location and Transfer

Control Requirement
Processing locations Disclose countries where PII is processed
Cross-border transfers Address transfer mechanisms
Sub-processor locations Transparency about sub-processor geography

Sub-Processor Management

Critical requirements for managing sub-processors:

Requirement Implementation
Disclosure List all sub-processors used
Flow-down Ensure sub-processors meet same requirements
Notification Inform controllers of sub-processor changes
Assessment Evaluate sub-processor security
Contracts Equivalent contractual protections

Implementing ISO 27018

Step 1: Establish Foundation

Before pursuing ISO 27018:

Prerequisite Status Required
ISO 27001 certification Required or in progress
PII inventory Know what personal data you process
Processing activities Document your cloud services
Customer contracts Review processor agreements

Step 2: Gap Assessment

Assess current state against ISO 27018:

Assessment Area Questions to Answer
PII handling How is customer PII protected?
Sub-processors Who else processes the data?
Data locations Where is PII stored and processed?
Retention practices How long is PII kept?
Deletion capabilities Can you return/delete PII?
Disclosure procedures How are legal requests handled?

Step 3: Control Implementation

Address gaps with specific controls:

Gap Area Typical Controls
Encryption gaps Implement encryption at rest and in transit
Access controls Strengthen PII access restrictions
Deletion process Create verified deletion procedures
Sub-processor management Establish assessment and monitoring program
Documentation Create required policies and procedures

Step 4: Certification

ISO 27018 certification typically occurs:

Approach Description
Combined audit With ISO 27001 certification/surveillance
Extension audit Additional audit scope for existing ISO 27001
Same certification body Usually same auditor team

GDPR Alignment

Supporting Processor Obligations

ISO 27018 aligns with GDPR Article 28 processor requirements:

GDPR Article 28 Requirement ISO 27018 Support
Process only on documented instructions Purpose limitation controls
Ensure authorized personnel confidentiality Access control, confidentiality agreements
Take appropriate security measures ISO 27001/27018 security controls
Respect sub-processor conditions Sub-processor management requirements
Assist controller with data subject rights Technical capabilities for requests
Delete or return PII after service PII return and disposal controls
Demonstrate compliance Audit rights, certification evidence

Data Processing Agreements

ISO 27018 certification strengthens DPAs:

DPA Element How ISO 27018 Helps
Security measures Certified security controls
Sub-processor disclosure Required transparency
Data location Geographic disclosure requirements
Audit rights Independent certification evidence
Deletion Verified disposal procedures

Common Questions

Does ISO 27018 apply to private clouds?

ISO 27018 specifically addresses public cloud environments. However, its principles can inform private cloud privacy practices. For private cloud, ISO 27001 and ISO 27701 may be more applicable.

Can cloud customers get ISO 27018 certified?

ISO 27018 is designed for PII processors (cloud providers). Cloud customers using cloud services would pursue ISO 27001, potentially with ISO 27701 for comprehensive privacy management.

How does ISO 27018 differ from ISO 27701?

Aspect ISO 27018 ISO 27701
Scope Public cloud PII processors All privacy roles
Role PII processor focus Controllers and processors
Environment Cloud-specific Any environment
Foundation Builds on ISO 27001 Extends ISO 27001 to PIMS

Do major cloud providers have ISO 27018?

Yes, all major providers hold ISO 27018:

Provider ISO 27018 Status
AWS Certified
Microsoft Azure Certified
Google Cloud Certified
Salesforce Certified

This means customers can leverage provider certifications for their own compliance.

Is ISO 27018 mandatory for GDPR?

ISO 27018 is not mandatory, but it demonstrates good practices that support GDPR compliance. GDPR Article 28 requires appropriate security measures, and ISO 27018 certification is strong evidence of this.

Practical Considerations

Cost and Timeline

Factor Consideration
Initial investment Moderate (building on ISO 27001)
Additional audit days 1-2 days beyond ISO 27001 audit
Ongoing maintenance Included in surveillance audits
Efficiency Combined audit most cost-effective

Maintaining Certification

Like ISO 27001, ISO 27018 follows a three-year certification cycle:

Year Activity
Year 1 Initial certification (with ISO 27001)
Year 2 Surveillance audit
Year 3 Surveillance audit
Year 4 Recertification audit

Business Value

Stakeholder Value Delivered
Customers Assurance their data is protected
Sales teams Competitive differentiator
Legal/compliance Due diligence evidence
Regulators Demonstration of good practices
Partners Trust in data handling

The Bastion Approach

Cloud Privacy Simplified

Bastion helps organizations navigate ISO 27018:

Challenge Bastion Solution
Understanding requirements Expert guidance on applicability
Gap assessment Evaluation against ISO 27018 controls
Control implementation Practical implementation support
Sub-processor management Vendor assessment frameworks
Certification preparation Audit readiness review

Combined Certification Strategy

For organizations pursuing ISO 27018:

Approach Recommendation
Starting fresh Include ISO 27018 in initial ISO 27001 project
Already ISO 27001 certified Add ISO 27018 at next surveillance
Privacy-focused Consider ISO 27018 + ISO 27701 combination

Ready to protect personal data in your cloud environment? Talk to our team


Sources