ClausesGLOBAL

ISO 27018 Vendor Contract Requirements

A practical clause pack for public cloud PII processor contracts.

Use it to tie processor obligations to the evidence you can actually provide.

Author
Sorena AI
Published
Mar 4, 2026
Updated
Mar 4, 2026
Sections
8

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 4, 2026
Updated Mar 4, 2026
Overview

ISO/IEC 27018 is strongest when the contract defines the processor obligation, the operating mechanism, and the evidence model in the same place. This page turns the main ISO 27018 control themes into a processor clause checklist that also fits GDPR Article 28 style review.

Section 1

Clause family 1: processor role, scope, and instructions

The agreement should identify the service, the categories of processing performed under customer instruction, and the boundary between processor activity and any separate controller activity of the provider. It should also define how instructions are issued, changed, and interpreted.

This is the clause family that prevents later disputes about product improvement, troubleshooting, and optional service features.

  • State that contracted PII is processed only under documented customer instructions
  • Define the process for instruction changes and the technical method choices the provider may make within those instructions
  • Identify any provider controlled data sets that are outside the processor scope
Section 2

Clause family 2: confidentiality, security baseline, and unilateral change limits

The contract should require confidentiality obligations for personnel with access to PII and minimum technical and organizational measures that cannot be reduced unilaterally by the provider. This aligns with both GDPR processor expectations and ISO 27018 guidance.

Security commitments should be specific enough to support review without promising product features you do not operate.

  • Confidentiality obligations survive termination
  • Minimum security measures are documented and not subject to unilateral reduction
  • Customer facing security summary points to the detailed policy and evidence source
Section 4

Clause family 4: subprocessors, countries, and change notices

The agreement should disclose that subprocessors are used, define the authorization model, require timely notice of intended changes, and identify the countries where subprocessors may process or store PII. It should also explain how subprocessors are bound to meet or exceed the provider's obligations.

This is the clause family most likely to be escalated by enterprise procurement.

  • Include a maintained subprocessor list or committed publication method
  • State notice timing, objection method, and termination path if objections cannot be resolved
  • Cover backup, support, and infrastructure subprocessors, not only core product vendors
Section 5

Clause family 5: disclosure requests

The contract should define how the provider handles requests from law enforcement or other authorities. ISO 27018 expects notice of legally binding requests unless prohibited, rejection of requests that are not legally binding, customer consultation where lawful, and recorded disclosures.

A strong clause does not rely on vague promises to comply with applicable law. It defines the workflow.

  • Define notice timing and the conditions where notice cannot be given
  • Commit to reject non-binding requests
  • Commit to record the disclosure, the source of the request, and the source of the authority
Section 6

Clause family 6: breach support and incident records

The breach clause should define prompt customer notice, the maximum delay, the information fields to be provided, and the cooperation model for follow up questions. It should also require the provider to maintain incident records detailed enough for customer legal assessment.

This clause should distinguish provider caused incidents from incidents caused solely by customer controlled components where responsibility is different.

  • State the notification trigger and maximum delay
  • List required information fields such as time period, consequences, data affected, and remediation
  • Explain how the provider supports authority notification duties where the customer has them
Recommended next step

Keep ISO 27018 Vendor Contract Requirements in one governed evidence system

SSOT can take ISO 27018 Vendor Contract Requirements from reusing this material inside a governed evidence system to a reusable workflow inside Sorena. Teams working on ISO 27018 can keep owners, evidence, and next steps aligned without copying this guide into separate documents.

Section 7

Clause family 7: return, transfer, disposal, and backup erasure

The contract should provide a return, transfer, and disposal model that covers primary systems, replicated systems, backup, and business continuity environments. It should describe the deletion mechanism or standard and the retention period before final destruction after contract end.

If the contract says delete on termination but the backups are ignored, the clause is not operationally complete.

  • Offer export or transfer where appropriate before deletion
  • Name the erasure or destruction method and the verification model
  • Flow the same requirements to subprocessors and retain completion evidence
Section 8

Clause family 8: audit rights and independent evidence

In multi-tenant cloud services, direct customer audits can be impractical or can increase security risk. ISO 27018 allows the use of independent evidence in those cases, provided sufficient transparency is given to the customer.

The contract should explain what evidence the provider will make available and under what conditions.

  • Define the standard evidence package, refresh cadence, and NDA conditions
  • Keep historical policies and procedures for a documented retention period, with five years as the recommended minimum where no stricter rule applies
  • Make sure the contract promises only evidence you can sustain over time
Primary sources

References and citations

eur-lex.europa.eu
Referenced sections
  • Useful primary source for controller processor contract structure under GDPR Article 28(7).
eur-lex.europa.eu
Referenced sections
  • Primary legal source for processor contract obligations.
Related guides

Explore more topics