- Processor legal duties that teams commonly map to ISO 27018 controls in practice.
References and citations
- Official ISO listing for the current edition status.
- Official ISO page for the withdrawn 2019 edition referenced by many existing programs.
Quick answers to the ISO/IEC 27018 questions that matter in cloud privacy reviews.
Focus on scope, processor boundaries, disclosure, breach support, deletion, and customer evidence.
Structured answer sets in this page tree.
Cited legal and guidance references.
ISO/IEC 27018 is a code of practice for protection of PII in public clouds acting as PII processors. Teams use it when they need a cloud specific processor control model that can be tied to contracts, operating procedures, and customer evidence. These answers focus on how the standard works in real procurement, privacy, and audit workflows.
It is a code of practice for protecting personally identifiable information in public cloud services that act as PII processors. It builds on ISO/IEC 27002 style controls and adds cloud specific guidance for processor obligations.
The practical outcome is a processor control model for instructions, subprocessor management, disclosure handling, breach support, deletion, and customer assurance.
Public cloud providers, SaaS vendors, managed platforms, and hosting services should care when they process personal data on behalf of customers. Privacy teams and procurement teams should also use it to evaluate whether the provider can support processor obligations in practice.
It is especially useful where a provider wants a repeatable answer to customer questions about subprocessors, countries, disclosure requests, incident handling, and deletion.
No. The official ISO listing now shows ISO/IEC 27018:2025 as the current edition, and the ISO/IEC 27018:2019 page is marked withdrawn.
The 2019 text still matters for implementation review because it contains the detailed control themes used in many existing programs, but the current ISO listing should control any claim about the active edition.
A provider is acting as a PII processor when it processes PII for and according to the instructions of the cloud service customer. The distinction depends on the provider not having independent processing objectives for that customer PII.
A provider can still act as a controller for separate data sets, such as account ownership data or its own business records.
It requires that PII processed under contract is not processed for any purpose independent of the customer instruction. That means independent product, marketing, or advertising use is a red flag unless the legal basis and contract structure clearly authorize it.
The standard also says marketing or advertising use should not happen without express consent, and consent should not be made a condition of receiving the service.
It expects disclosure before use, transparent contract treatment, notice of intended changes, and a customer ability to object or terminate. It also expects providers to identify the relevant subprocessor countries and explain how subprocessors are required to meet or exceed the processor's obligations.
This is why a one line statement that subprocessors may change at any time is not enough.
The provider should notify the customer of legally binding disclosure requests unless notice is prohibited, reject requests that are not legally binding, consult the customer where legally permissible, and record disclosures.
Records should capture both the source of the disclosure and the source of the authority for the disclosure.
It expects prompt notice to the relevant cloud service customer when unauthorized access to PII, or to processing equipment or facilities, results in loss, disclosure, or alteration of PII.
The contract should define the maximum notification delay and the information required so the customer can perform its legal assessment and any regulator notification it owes.
The deletion and return policy should address export, transfer, disposal, anonymization, and archiving, and it should explain how PII is erased from all relevant locations, including backup and business continuity storage, once it is no longer needed for the customer's purpose.
The contract should also define the deletion mechanism or commercial standard used, and the retention period before destruction after contract termination.
The standard recommends keeping current and historical policies and procedures for a documented period. In the absence of a specific legal or contractual requirement, it recommends a minimum retention period of five years.
This is especially useful for customer disputes, authority investigations, and proving that older commitments were in force at a specific time.
Research Copilot can take ISO 27018 FAQ from cited answers to recurring questions on this topic to a reusable workflow inside Sorena. Teams working on ISO 27018 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.
Start from ISO 27018 FAQ and answer scope, timing, and interpretation questions with cited outputs.
Review your current process, evidence gaps, and next steps for ISO 27018 FAQ.