FAQGLOBAL

ISO 27018 FAQ

Quick answers to the ISO/IEC 27018 questions that matter in cloud privacy reviews.

Focus on scope, processor boundaries, disclosure, breach support, deletion, and customer evidence.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Questions
10

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ISO/IEC 27018 is a code of practice for protection of PII in public clouds acting as PII processors. Teams use it when they need a cloud specific processor control model that can be tied to contracts, operating procedures, and customer evidence. These answers focus on how the standard works in real procurement, privacy, and audit workflows.

Question 1

What is ISO/IEC 27018 in one sentence?

It is a code of practice for protecting personally identifiable information in public cloud services that act as PII processors. It builds on ISO/IEC 27002 style controls and adds cloud specific guidance for processor obligations.

The practical outcome is a processor control model for instructions, subprocessor management, disclosure handling, breach support, deletion, and customer assurance.

  • Use it to design controls and evidence for processor services
  • Do not treat it as a substitute for the law that applies to your contract or jurisdiction
Question 2

Who should care about ISO 27018?

Public cloud providers, SaaS vendors, managed platforms, and hosting services should care when they process personal data on behalf of customers. Privacy teams and procurement teams should also use it to evaluate whether the provider can support processor obligations in practice.

It is especially useful where a provider wants a repeatable answer to customer questions about subprocessors, countries, disclosure requests, incident handling, and deletion.

  • Cloud providers use it to structure controls and customer evidence
  • Customers use it to ask better due diligence questions and review contract commitments
Question 3

Is ISO 27018:2019 still current?

No. The official ISO listing now shows ISO/IEC 27018:2025 as the current edition, and the ISO/IEC 27018:2019 page is marked withdrawn.

The 2019 text still matters for implementation review because it contains the detailed control themes used in many existing programs, but the current ISO listing should control any claim about the active edition.

  • Current listing: ISO/IEC 27018:2025
  • Detailed local control pack used here: ISO/IEC 27018:2019
Question 4

What makes a provider a PII processor under ISO 27018?

A provider is acting as a PII processor when it processes PII for and according to the instructions of the cloud service customer. The distinction depends on the provider not having independent processing objectives for that customer PII.

A provider can still act as a controller for separate data sets, such as account ownership data or its own business records.

  • Write down the processor scope service by service
  • Separate customer instruction data from provider controlled business data
Question 5

Does ISO 27018 ban all provider use of customer data?

It requires that PII processed under contract is not processed for any purpose independent of the customer instruction. That means independent product, marketing, or advertising use is a red flag unless the legal basis and contract structure clearly authorize it.

The standard also says marketing or advertising use should not happen without express consent, and consent should not be made a condition of receiving the service.

  • Review analytics, product improvement, and model training workflows carefully
  • Keep evidence that optional marketing use is separated from core service access
Question 6

What does ISO 27018 expect for subprocessors?

It expects disclosure before use, transparent contract treatment, notice of intended changes, and a customer ability to object or terminate. It also expects providers to identify the relevant subprocessor countries and explain how subprocessors are required to meet or exceed the processor's obligations.

This is why a one line statement that subprocessors may change at any time is not enough.

  • Maintain a named subprocessor list
  • State the countries where subprocessors can process data
  • Keep the flow-down obligation model available for review
Question 7

How should disclosure requests be handled?

The provider should notify the customer of legally binding disclosure requests unless notice is prohibited, reject requests that are not legally binding, consult the customer where legally permissible, and record disclosures.

Records should capture both the source of the disclosure and the source of the authority for the disclosure.

  • Use a legal intake workflow, not ad hoc email handling
  • Preserve the evidence trail for every disclosure decision
Question 8

What does the standard expect for data breach support?

It expects prompt notice to the relevant cloud service customer when unauthorized access to PII, or to processing equipment or facilities, results in loss, disclosure, or alteration of PII.

The contract should define the maximum notification delay and the information required so the customer can perform its legal assessment and any regulator notification it owes.

  • Keep incident records with time period, consequences, data affected, reporting path, and remediation steps
  • Document direct regulator notice duties separately where local law imposes them on the processor
Question 9

What should the deletion policy cover?

The deletion and return policy should address export, transfer, disposal, anonymization, and archiving, and it should explain how PII is erased from all relevant locations, including backup and business continuity storage, once it is no longer needed for the customer's purpose.

The contract should also define the deletion mechanism or commercial standard used, and the retention period before destruction after contract termination.

  • Do not limit the policy to the primary production environment
  • Make the verification method explicit so deletion can be evidenced
Question 10

What records should be retained?

The standard recommends keeping current and historical policies and procedures for a documented period. In the absence of a specific legal or contractual requirement, it recommends a minimum retention period of five years.

This is especially useful for customer disputes, authority investigations, and proving that older commitments were in force at a specific time.

  • Retain superseded policies, procedures, and notification templates
  • Align the five year recommendation with any stricter legal, contractual, or certification requirement
Recommended next step

Use ISO 27018 FAQ as a cited research workflow

Research Copilot can take ISO 27018 FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on ISO 27018 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Primary sources

References and citations

eur-lex.europa.eu
Referenced sections
  • Processor legal duties that teams commonly map to ISO 27018 controls in practice.
Related guides

Explore more topics