ChecklistGLOBAL

ISO 27018 Privacy Control Checklist

A control and evidence checklist for public cloud PII processor operations.

Use it for gap assessment, procurement preparation, and internal audit readiness.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
9

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ISO/IEC 27018 is most useful when each privacy control is tied to a contract commitment, an operating procedure, and a record you can actually produce during a customer review. This checklist focuses on the highest value processor controls and the evidence that proves they are not just policy text.

Section 1

How to use this checklist

For every control area, collect three things: the contractual commitment, the operating method, and a live evidence sample. If any one of those is missing, the control will be weak under review.

Run the checklist service by service, because processor boundaries and subprocessor use often vary between products.

  • Define the in-scope services and the processing role for each one
  • Assign an owner and review cadence for every control theme
  • Record where the current evidence lives and how long historical records are retained
Recommended next step

Turn ISO 27018 Privacy Control Checklist into an operational assessment

Assessment Autopilot can take ISO 27018 Privacy Control Checklist from turning this checklist into an operational workflow to a reusable workflow inside Sorena. Teams working on ISO 27018 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 2

Processor scope and customer instructions

Verify that the service is operating as a public cloud PII processor and not quietly expanding into controller style reuse of customer data. Confirm that the customer instruction boundary is clear enough to govern purpose, timing, and method.

This is the foundation for every downstream control.

  • Service description identifies processor activities and any separate controller activities
  • Customer instructions are documented and change controlled
  • Evidence exists for how provider chosen technical methods still remain within the customer purpose
Section 3

Purpose limitation and marketing restrictions

Check that contracted PII is not used for independent purposes. Check separately that marketing or advertising use is either absent or supported by express consent that is not required to receive the service.

This control should be reviewed with product, growth, and analytics teams, not only legal.

  • Policy prohibits independent processing of contracted PII
  • Marketing use requires express consent and is optional
  • Evidence includes feature gating, consent records, and internal review approvals
Section 4

Subprocessor transparency and country disclosure

Review whether subprocessor use is disclosed before use, whether changes trigger timely notice, and whether the register includes the countries where data can be processed or stored.

Do not forget backup, support, and infrastructure subprocessors.

  • Named subprocessor register is current
  • Customer notice and objection or termination workflow is documented
  • Flow-down obligation baseline exists for each subprocessor
  • Country list covers both primary processing and replicated or backup storage
Section 5

Disclosure request handling

Check whether the provider can distinguish legally binding requests from informal requests, whether customer consultation is built into the runbook where lawful, and whether all disclosures are recorded with the source of the request and the source of authority.

This is one of the easiest controls to test because the evidence trail should be explicit.

  • Disclosure runbook exists and includes legal review criteria
  • Records capture request source, authority source, customer notification, and actual disclosure content
  • Evidence shows rejection of requests that are not legally binding
Section 6

Breach notification support and incident records

Check whether the contract defines maximum notification delay and required fields, and whether incident records are detailed enough for customer legal assessment.

A simple ticket summary is rarely enough.

  • Runbook includes prompt customer notification path
  • Incident record includes time period, consequences, data affected, reporter, recipients, and remediation
  • Evidence shows whether loss, disclosure, or alteration of PII occurred
Section 7

Deletion, return, transfer, and backup handling

Check whether the disposal policy covers return, transfer, deletion, destruction, anonymization, and archiving. Check whether the policy and contract explain how PII is erased from backup and business continuity environments.

Deletion claims should always name the mechanism or standard used.

  • Policy is available to customers
  • Contract defines mechanism, timing, and verification method
  • Evidence includes export logs, deletion attestations, and subprocessor completion records
Section 8

Logs, temporary files, and record retention

The standard expects criteria for how logs can be made available to customers, deletion of logged information within a specified and documented period, and periodic deletion of aged temporary files that are no longer needed.

It also recommends a minimum five year retention period for current and historical policies and procedures when no stricter requirement applies.

  • Log availability criteria are documented and customer scoped
  • Temporary file cleanup period is defined and enforced
  • Historical policy and procedure retention is documented and tested
Section 9

Independent assurance evidence

Check whether the service can satisfy customer review without unsafe direct inspection of multi-tenant systems. The standard expressly contemplates independent evidence where individual audits are impractical or increase risk.

This evidence model should be prepared before large customers ask for it.

  • Evidence pack maps controls to documents and record samples
  • Independent assurance material is current and scoped to the relevant service
  • NDA pathway exists where sensitive subprocessor or architecture detail cannot be published openly
Primary sources

References and citations

eur-lex.europa.eu
Referenced sections
  • Useful legal baseline for processor contracts, security, and breach support.
Related guides

Explore more topics