ISO 27018: Protection of Personally Identifiable Information
What is 27018?
ISO/IEC 27018 is an information security code of practice for cloud service providers who process personally identifiable information for their customers. It’s an extension to ISO/IEC 27001:2013 and ISO/IEC 27002, and it provides additional security controls. The standard details privacy requirements and security control enhancements for privacy to be implemented by cloud service providers.It is complementary to ISO 27017, Security Control for Cloud Services, and to ISO 27701, Privacy Information Management, both of which also extend ISO 27001.
As an extension to ISO 27001, ISO 27018 provides guidance on 16 ISO 27002 controls, as well as providing 25 new privacy and security controls:
-
The requirement to cooperate with PII controllers
-
The maintenance of PII principals’ rights
-
Compliance with fundamental privacy requirements, such as data minimisation and accuracy
-
The principles of transparency and accountability
-
Additional security controls
-
Requirements for sub-contracted processing
Helps you with
- Customer trust
- Brand reputation
- Competitive advantage
- Data breaches
- Continued confidentiality
- Meet compliance
- Risk management
- Improved security
- Procurement
Other risk management standards:
- ISO 27001 - Information Security
- ISO 27701 - GDPR Compliance
- BS 10012 - Personal Information
- ISO 20000-1 - IT Service Management
- ISO 27017 - Security Controls for Cloud Services
- ISO 22301 - Business Continuity
- ISO 44001 - Collaborative Working
- ISO 55001 - Asset Management
- ISO 41001 - Facilities Management
ISO 27001 training
Benefits of ISO 27018 Certification
Reduce risk
It helps reduce the risk of a privacy breach and fines from the ICO.
Customer assurance
Provides external assurance to customers that personal information processed in the cloud by the cloud service provider is managed in a compliant manner.
Alternative to ISO 27701
It may be considered an appropriate alternative to ISO 27701 in the cloud services processor context.
Extends and enhances certification
It extends and enhances a clients ISO 27001 certification.
Privacy framework
Provides a comprehensive privacy framework for cloud service providers who want increased assurance on the privacy compliance of their cloud services.
Steps to Certification
-
Step 1
Complete a Quote Request Form so we can understand you and your business. We will then use this to personally prepare a proposal for your certification and define what is known as your 'scope of assessment'.
-
Step 2
We will then contact you to book your assessment with an NQA assessor. It consists of two mandatory visits that form the Initial Certification Audit. Please note that you must be able to demonstrate that your management system has been operational for a minimum of three months and has been subject to a management review and a full cycle of internal audits.
-
Step 3
Following a successful stage two audit, a decision is made. If positive, your certification will be issued by NQA, with both a hard and soft copy of the certificate awarded. Certification is valid for three years and maintained through surveillance audits (years one and two) and a recertification audit in year three.
Information Security Toolkit 2013
Related ISO 27001 Content
What's next
Get in touch today to begin your journey to a greener, more sustainable business and a member of our team will be in touch to discuss your requirements: