Information technology - Security techniques - Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC 27018:2019)

This document establishes commonly accepted control objectives, controls and guidelines for
implementing measures to protect Personally Identifiable Information (PII) in line with the privacy
principles in ISO/IEC 29100 for the public cloud computing environment.
In particular, this document specifies guidelines based on ISO/IEC 27002, taking into consideration
the regulatory requirements for the protection of PII which can be applicable within the context of the
information security risk environment(s) of a provider of public cloud services.
This document is applicable to all types and sizes of organizations, including public and private
companies, government entities and not-for-profit organizations, which provide information processing
services as PII processors via cloud computing under contract to other organizations.
The guidelines in this document can also be relevant to organizations acting as PII controllers. However,
PII controllers can be subject to additional PII protection legislation, regulations and obligations, not
applying to PII processors. This document is not intended to cover such additional obligations.

Informationstechnik - Sicherheitsverfahren - Leitfaden zum Schutz personenbezogener Daten (PII) in öffentlichen Cloud-Diensten als Auftragsdatenverarbeitung (ISO/IEC 27018:2019)

Technologies de l'information - Techniques de sécurité - Code de bonnes pratiques pour la protection des informations personnelles identifiables (PII) dans l'informatique en nuage public agissant comme processeur de PII (ISO/IEC 27018:2019)

Informacijska tehnologija - Varnostne tehnike - Pravila ravnanja za zaščito osebno prepoznavnih informacij (PII) v javnih oblakih, ki delujejo kot procesorji PII (ISO/IEC 27018:2019)

General Information

Status
Published
Public Enquiry End Date
31-Mar-2020
Publication Date
22-Jun-2020
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
18-Jun-2020
Due Date
23-Aug-2020
Completion Date
23-Jun-2020

Buy Standard

Standard
SIST EN ISO/IEC 27018:2020
English language
35 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day
Standard
SIST EN ISO/IEC 27018:2020
English language
35 pages
sale 10% off
Preview
sale 10% off
Preview

e-Library read for
1 day

Standards Content (sample)

SLOVENSKI STANDARD
SIST EN ISO/IEC 27018:2020
01-september-2020

Informacijska tehnologija - Varnostne tehnike - Pravila ravnanja za zaščito osebno

prepoznavnih informacij (PII) v javnih oblakih, ki delujejo kot procesorji PII
(ISO/IEC 27018:2019)

Information technology - Security techniques - Code of practice for protection of

personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC

27018:2019)

Informationstechnik - Sicherheitsverfahren - Leitfaden zum Schutz personenbezogener

Daten (PII) in öffentlichen Cloud-Diensten als Auftragsdatenverarbeitung (ISO/IEC

27018:2019)

Technologies de l'information - Techniques de sécurité - Code de bonnes pratiques pour

la protection des informations personnelles identifiables (PII) dans l'informatique en

nuage public agissant comme processeur de PII (ISO/IEC 27018:2019)
Ta slovenski standard je istoveten z: EN ISO/IEC 27018:2020
ICS:
35.030 Informacijska varnost IT Security
35.210 Računalništvo v oblaku Cloud computing
SIST EN ISO/IEC 27018:2020 en,fr,de

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 27018:2020
---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 27018:2020
EUROPEAN STANDARD
EN ISO/IEC 27018
NORME EUROPÉENNE
EUROPÄISCHE NORM
May 2020
ICS 35.030
English version
Information technology - Security techniques - Code of
practice for protection of personally identifiable
information (PII) in public clouds acting as PII processors
(ISO/IEC 27018:2019)

Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitsverfahren - Leitfaden

- Code de bonnes pratiques pour la protection des zum Schutz personenbezogener Daten (PII) in

informations personnelles identifiables (PII) dans öffentlichen Cloud-Diensten als

l'informatique en nuage public agissant comme Auftragsdatenverarbeitung (ISO/IEC 27018:2019)

processeur de PII (ISO/IEC 27018:2019)
This European Standard was approved by CEN on 3 May 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for

giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical

references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to

any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by

translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC

Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,

Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,

Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,

Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 27018:2020 E

reserved worldwide for CEN national Members and for
CENELEC Members.
---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 27018:2020
EN ISO/IEC 27018:2020 (E)
Contents Page

European foreword ....................................................................................................................................................... 3

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 27018:2020
EN ISO/IEC 27018:2020 (E)
European foreword

The text of ISO/IEC 27018:2019 has been prepared by Technical Committee ISO/IEC JTC 1 "Information

technology” of the International Organization for Standardization (ISO) and has been taken over as

EN ISO/IEC 27018:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”

the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an

identical text or by endorsement, at the latest by November 2020, and conflicting national standards

shall be withdrawn at the latest by November 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CEN shall not be held responsible for identifying any or all such patent rights.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the

following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,

Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,

Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of

North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the

United Kingdom.
Endorsement notice

The text of ISO/IEC 27018:2019 has been approved by CEN as EN ISO/IEC 27018:2020 without any

modification.
---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 27018:2020
---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 27018:2020
INTERNATIONAL ISO/IEC
STANDARD 27018
Second edition
2019-01
Information technology — Security
techniques — Code of practice for
protection of personally identifiable
information (PII) in public clouds
acting as PII processors
Technologies de l'information — Techniques de sécurité — Code de
bonnes pratiques pour la protection des informations personnelles
identifiables (PII) dans l'informatique en nuage public agissant
comme processeur de PII
Reference number
ISO/IEC 27018:2019(E)
ISO/IEC 2019
---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2019

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2019 – All rights reserved
---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................vi

Introduction ..............................................................................................................................................................................................................................vii

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ...................................................................................................................................................................................... 1

3 Terms and definitions ..................................................................................................................................................................................... 1

4 Overview ....................................................................................................................................................................................................................... 3

4.1 Structure of this document ........................................................................................................................................................... 3

4.2 Control categories ................................................................................................................................................................................ 4

5 Information security policies .................................................................................................................................................................. 4

5.1 Management direction for information security ....................................................................................................... 4

5.1.1 Policies for information security........................................................................................................................ 4

5.1.2 Review of the policies for information security .................................................................................... 5

6 Organization of information security ............................................................................................................................................. 5

6.1 Internal organization ......................................................................................................................................................................... 5

6.1.1 Information security roles and responsibilities ................................................................................... 5

6.1.2 Segregation of duties .................................................................................................................................................... 5

6.1.3 Contact with authorities ............................................................................................................................................ 5

6.1.4 Contact with special interest groups .............................................................................................................. 5

6.1.5 Information security in project management ......................................................................................... 5

6.2 Mobile devices and teleworking .............................................................................................................................................. 5

7 Human resource security ............................................................................................................................................................................ 5

7.1 Prior to employment .......................................................................................................................................................................... 5

7.2 During employment ............................................................................................................................................................................ 5

7.2.1 Management responsibilities ................................................................................................................................ 6

7.2.2 Information security awareness, education and training ............................................................ 6

7.2.3 Disciplinary process ........................................................................................................................................... ........... 6

7.3 Termination and change of employment ......................................................................................................................... 6

8 Asset management ............................................................................................................................................................................................. 6

9 Access control .......................................................................................................................................................................................................... 6

9.1 Business requirements of access control ......................................................................................................................... 6

9.2 User access management ............................................................................................................................................................... 6

9.2.1 User registration and de-registration ............................................................................................................ 7

9.2.2 User access provisioning........................................................................................................................................... 7

9.2.3 Management of privileged access rights ..................................................................................................... 7

9.2.4 Management of secret authentication information of users ...................................................... 7

9.2.5 Review of user access rights .................................................................................................................................. 7

9.2.6 Removal or adjustment of access rights ...................................................................................................... 7

9.3 User responsibilities .......................................................................................................................................................................... 7

9.3.1 Use of secret authentication information ................................................................................................... 7

9.4 System and application access control ............................................................................................................................... 7

9.4.1 Information access restriction ............................................................................................................................. 7

9.4.2 Secure log-on procedures ........................................................................................................................................ 8

9.4.3 Password management system ........................................................................................................................... 8

9.4.4 Use of privileged utility programs .................................................................................................................... 8

9.4.5 Access control to program source code ....................................................................................................... 8

10 Cryptography ............................................................................................................................................................................................................ 8

10.1 Cryptographic controls .................................................................................................................................................................... 8

10.1.1 Policy on the use of cryptographic controls ............................................................................................. 8

10.1.2 Key management ............................................................................................................................................................. 8

© ISO/IEC 2019 – All rights reserved iii
---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)

11 Physical and environmental security .............................................................................................................................................. 8

11.1 Secure areas ............................................................................................................................................................................................... 8

11.2 Equipment ................................................................................................................................................................................................... 9

11.2.1 Equipment siting and protection ....................................................................................................................... 9

11.2.2 Supporting utilities ........................................................................................................................................................ 9

11.2.3 Cabling security ................................................................................................................................................................ 9

11.2.4 Equipment maintenance ........................................................................................................................................... 9

11.2.5 Removal of assets ............................................................................................................................................................ 9

11.2.6 Security of equipment and assets off-premises .................................................................................... 9

11.2.7 Secure disposal or re-use of equipment ...................................................................................................... 9

11.2.8 Unattended user equipment .................................................................................................................................. 9

11.2.9 Clear desk and clear screen policy ................................................................................................................... 9

12 Operations security ........................................................................................................................................................................................... 9

12.1 Operational procedures and responsibilities ............................................................................................................... 9

12.1.1 Documented operating procedures ..............................................................................................................10

12.1.2 Change management .................................................................................................................................................10

12.1.3 Capacity management ..............................................................................................................................................10

12.1.4 Separation of development, testing and operational environments ................................10

12.2 Protection from malware ............................................................................................................................................................10

12.3 Backup .........................................................................................................................................................................................................10

12.3.1 Information backup ....................................................................................................................................................10

12.4 Logging and monitoring ...............................................................................................................................................................11

12.4.1 Event logging ....................................................................................................................................................................11

12.4.2 Protection of log information .............................................................................................................................11

12.4.3 Administrator and operator logs ....................................................................................................................11

12.4.4 Clock synchronization ..............................................................................................................................................12

12.5 Control of operational software ............................................................................................................................................12

12.6 Technical vulnerability management ...............................................................................................................................12

12.7 Information systems audit considerations ..................................................................................................................12

13 Communications security ........................................................................................................................................................................12

13.1 Network security management .............................................................................................................................................12

13.2 Information transfer .......................................................................................................................................................................12

13.2.1 Information transfer policies and procedures ....................................................................................12

13.2.2 Agreements on information transfer ..........................................................................................................12

13.2.3 Electronic messaging ................................................................................................................................................12

13.2.4 Confidentiality or non-disclosure agreements ...................................................................................12

14 System acquisition, development and maintenance ....................................................................................................13

15 Supplier relationships .................................................................................................................................................................................13

16 Information security incident management ........................................................................................................................13

16.1 Management of information security incidents and improvements .....................................................13

16.1.1 Responsibilities and procedures .....................................................................................................................13

16.1.2 Reporting information security events .....................................................................................................13

16.1.3 Reporting information security weaknesses ........................................................................................13

16.1.4 Assessment of and decision on information security events .................................................13

16.1.5 Response to information security incidents .........................................................................................14

16.1.6 Learning from information security incidents ....................................................................................14

16.1.7 Collection of evidence ........................................................................................................................................... ....14

17 Information security aspects of business continuity management .............................................................14

18 Compliance ..............................................................................................................................................................................................................14

18.1 Compliance with legal and contractual requirements .......................................................................................14

18.2 Information security reviews ..................................................................................................................................................14

18.2.1 Independent review of information security .......................................................................................14

18.2.2 Compliance with security policies and standards ...........................................................................14

18.2.3 Technical compliance review .............................................................................................................................14

iv © ISO/IEC 2019 – All rights reserved
---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)

Annex A (normative) Public cloud PII processor extended control set for PII protection ........................15

Bibliography .............................................................................................................................................................................................................................23

© ISO/IEC 2019 – All rights reserved v
---------------------- Page: 11 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical

activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work. In the field of information technology, ISO and IEC have established a joint technical committee,

ISO/IEC JTC 1.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for

the different types of document should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent

rights. Details of any patent rights identified during the development of the document will be in the

Introduction and/or on the ISO list of patent declarations received (see www .iso .org/patents).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to the

World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www .iso

.org/iso/foreword .html.

This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,

Subcommittee SC 27, IT Security techniques.

This second edition cancels and replaces the first edition (ISO/IEC 27018:2014), of which it constitutes

a minor revision. The main change compared to the previous edition is the correction of an editorial

mistake in Annex A.

Any feedback or questions on this document should be directed to the user’s national standards body. A

complete listing of these bodies can be found at www .iso .org/members .html.
vi © ISO/IEC 2019 – All rights reserved
---------------------- Page: 12 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Introduction
0.1 Background and context

Cloud service providers who process Personally Identifiable Information (PII) under contract to their

customers need to operate their services in ways that allow both parties to meet the requirements

of applicable legislation and regulations covering the protection of PII. The requirements and the

way in which the requirements are divided between the cloud service provider and its customers

vary according to legal jurisdiction, and according to the terms of the contract between the cloud

service provider and the customer. Legislation which governs how PII is allowed to be processed (i.e.

collected, used, transferred and disposed of) is sometimes referred to as data protection legislation;

PII is sometimes referred to as personal data or personal information. The obligations falling on a PII

processor vary from jurisdiction to jurisdiction, which makes it challenging for businesses providing

cloud computing services to operate multinationally.

A public cloud service provider is a “PII processor” when it processes PII for and according to the

instructions of a cloud service customer. The cloud service customer, who has the contractual

relationship with the public cloud PII processor, can range from a natural person, a “PII principal”,

processing his or her own PII in the cloud, to an organization, a “PII controller”, processing PII relating

to many PII principals. The cloud service customer can authorize one or more cloud service users

associated with it to use the services made available to it under its contract with the public cloud

PII processor. Note that the cloud s
...

SLOVENSKI STANDARD
SIST EN ISO/IEC 27018:2020
01-september-2020

Informacijska tehnologija - Varnostne tehnike - Pravila ravnanja za zaščito osebno

prepoznavnih informacij (PII) v javnih oblakih, ki delujejo kot procesorji PII
(ISO/IEC 27018:2019)

Information technology - Security techniques - Code of practice for protection of

personally identifiable information (PII) in public clouds acting as PII processors (ISO/IEC

27018:2019)

Informationstechnik - Sicherheitsverfahren - Leitfaden zum Schutz personenbezogener

Daten (PII) in öffentlichen Cloud-Diensten als Auftragsdatenverarbeitung (ISO/IEC

27018:2019)

Technologies de l'information - Techniques de sécurité - Code de bonnes pratiques pour

la protection des informations personnelles identifiables (PII) dans l'informatique en

nuage public agissant comme processeur de PII (ISO/IEC 27018:2019)
Ta slovenski standard je istoveten z: EN ISO/IEC 27018:2020
ICS:
35.030 Informacijska varnost IT Security
SIST EN ISO/IEC 27018:2020 en,fr,de

2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN ISO/IEC 27018:2020
---------------------- Page: 2 ----------------------
SIST EN ISO/IEC 27018:2020
EUROPEAN STANDARD
EN ISO/IEC 27018
NORME EUROPÉENNE
EUROPÄISCHE NORM
May 2020
ICS 35.030
English version
Information technology - Security techniques - Code of
practice for protection of personally identifiable
information (PII) in public clouds acting as PII processors
(ISO/IEC 27018:2019)

Technologies de l'information - Techniques de sécurité Informationstechnik - Sicherheitsverfahren - Leitfaden

- Code de bonnes pratiques pour la protection des zum Schutz personenbezogener Daten (PII) in

informations personnelles identifiables (PII) dans öffentlichen Cloud-Diensten als

l'informatique en nuage public agissant comme Auftragsdatenverarbeitung (ISO/IEC 27018:2019)

processeur de PII (ISO/IEC 27018:2019)
This European Standard was approved by CEN on 3 May 2020.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for

giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical

references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to

any CEN and CENELEC member.

This European Standard exists in three official versions (English, French, German). A version in any other language made by

translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC

Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,

Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,

Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,

Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom.
CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels

© 2020 CEN/CENELEC All rights of exploitation in any form and by any means Ref. No. EN ISO/IEC 27018:2020 E

reserved worldwide for CEN national Members and for
CENELEC Members.
---------------------- Page: 3 ----------------------
SIST EN ISO/IEC 27018:2020
EN ISO/IEC 27018:2020 (E)
Contents Page

European foreword ....................................................................................................................................................... 3

---------------------- Page: 4 ----------------------
SIST EN ISO/IEC 27018:2020
EN ISO/IEC 27018:2020 (E)
European foreword

The text of ISO/IEC 27018:2019 has been prepared by Technical Committee ISO/IEC JTC 1 "Information

technology” of the International Organization for Standardization (ISO) and has been taken over as

EN ISO/IEC 27018:2020 by Technical Committee CEN/CLC/JTC 13 “Cybersecurity and Data Protection”

the secretariat of which is held by DIN.

This European Standard shall be given the status of a national standard, either by publication of an

identical text or by endorsement, at the latest by November 2020, and conflicting national standards

shall be withdrawn at the latest by November 2020.

Attention is drawn to the possibility that some of the elements of this document may be the subject of

patent rights. CEN shall not be held responsible for identifying any or all such patent rights.

According to the CEN-CENELEC Internal Regulations, the national standards organizations of the

following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,

Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,

Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of

North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the

United Kingdom.
Endorsement notice

The text of ISO/IEC 27018:2019 has been approved by CEN as EN ISO/IEC 27018:2020 without any

modification.
---------------------- Page: 5 ----------------------
SIST EN ISO/IEC 27018:2020
---------------------- Page: 6 ----------------------
SIST EN ISO/IEC 27018:2020
INTERNATIONAL ISO/IEC
STANDARD 27018
Second edition
2019-01
Information technology — Security
techniques — Code of practice for
protection of personally identifiable
information (PII) in public clouds
acting as PII processors
Technologies de l'information — Techniques de sécurité — Code de
bonnes pratiques pour la protection des informations personnelles
identifiables (PII) dans l'informatique en nuage public agissant
comme processeur de PII
Reference number
ISO/IEC 27018:2019(E)
ISO/IEC 2019
---------------------- Page: 7 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2019

All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may

be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting

on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address

below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2019 – All rights reserved
---------------------- Page: 8 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Contents Page

Foreword ........................................................................................................................................................................................................................................vi

Introduction ..............................................................................................................................................................................................................................vii

1 Scope ................................................................................................................................................................................................................................. 1

2 Normative references ...................................................................................................................................................................................... 1

3 Terms and definitions ..................................................................................................................................................................................... 1

4 Overview ....................................................................................................................................................................................................................... 3

4.1 Structure of this document ........................................................................................................................................................... 3

4.2 Control categories ................................................................................................................................................................................ 4

5 Information security policies .................................................................................................................................................................. 4

5.1 Management direction for information security ....................................................................................................... 4

5.1.1 Policies for information security........................................................................................................................ 4

5.1.2 Review of the policies for information security .................................................................................... 5

6 Organization of information security ............................................................................................................................................. 5

6.1 Internal organization ......................................................................................................................................................................... 5

6.1.1 Information security roles and responsibilities ................................................................................... 5

6.1.2 Segregation of duties .................................................................................................................................................... 5

6.1.3 Contact with authorities ............................................................................................................................................ 5

6.1.4 Contact with special interest groups .............................................................................................................. 5

6.1.5 Information security in project management ......................................................................................... 5

6.2 Mobile devices and teleworking .............................................................................................................................................. 5

7 Human resource security ............................................................................................................................................................................ 5

7.1 Prior to employment .......................................................................................................................................................................... 5

7.2 During employment ............................................................................................................................................................................ 5

7.2.1 Management responsibilities ................................................................................................................................ 6

7.2.2 Information security awareness, education and training ............................................................ 6

7.2.3 Disciplinary process ........................................................................................................................................... ........... 6

7.3 Termination and change of employment ......................................................................................................................... 6

8 Asset management ............................................................................................................................................................................................. 6

9 Access control .......................................................................................................................................................................................................... 6

9.1 Business requirements of access control ......................................................................................................................... 6

9.2 User access management ............................................................................................................................................................... 6

9.2.1 User registration and de-registration ............................................................................................................ 7

9.2.2 User access provisioning........................................................................................................................................... 7

9.2.3 Management of privileged access rights ..................................................................................................... 7

9.2.4 Management of secret authentication information of users ...................................................... 7

9.2.5 Review of user access rights .................................................................................................................................. 7

9.2.6 Removal or adjustment of access rights ...................................................................................................... 7

9.3 User responsibilities .......................................................................................................................................................................... 7

9.3.1 Use of secret authentication information ................................................................................................... 7

9.4 System and application access control ............................................................................................................................... 7

9.4.1 Information access restriction ............................................................................................................................. 7

9.4.2 Secure log-on procedures ........................................................................................................................................ 8

9.4.3 Password management system ........................................................................................................................... 8

9.4.4 Use of privileged utility programs .................................................................................................................... 8

9.4.5 Access control to program source code ....................................................................................................... 8

10 Cryptography ............................................................................................................................................................................................................ 8

10.1 Cryptographic controls .................................................................................................................................................................... 8

10.1.1 Policy on the use of cryptographic controls ............................................................................................. 8

10.1.2 Key management ............................................................................................................................................................. 8

© ISO/IEC 2019 – All rights reserved iii
---------------------- Page: 9 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)

11 Physical and environmental security .............................................................................................................................................. 8

11.1 Secure areas ............................................................................................................................................................................................... 8

11.2 Equipment ................................................................................................................................................................................................... 9

11.2.1 Equipment siting and protection ....................................................................................................................... 9

11.2.2 Supporting utilities ........................................................................................................................................................ 9

11.2.3 Cabling security ................................................................................................................................................................ 9

11.2.4 Equipment maintenance ........................................................................................................................................... 9

11.2.5 Removal of assets ............................................................................................................................................................ 9

11.2.6 Security of equipment and assets off-premises .................................................................................... 9

11.2.7 Secure disposal or re-use of equipment ...................................................................................................... 9

11.2.8 Unattended user equipment .................................................................................................................................. 9

11.2.9 Clear desk and clear screen policy ................................................................................................................... 9

12 Operations security ........................................................................................................................................................................................... 9

12.1 Operational procedures and responsibilities ............................................................................................................... 9

12.1.1 Documented operating procedures ..............................................................................................................10

12.1.2 Change management .................................................................................................................................................10

12.1.3 Capacity management ..............................................................................................................................................10

12.1.4 Separation of development, testing and operational environments ................................10

12.2 Protection from malware ............................................................................................................................................................10

12.3 Backup .........................................................................................................................................................................................................10

12.3.1 Information backup ....................................................................................................................................................10

12.4 Logging and monitoring ...............................................................................................................................................................11

12.4.1 Event logging ....................................................................................................................................................................11

12.4.2 Protection of log information .............................................................................................................................11

12.4.3 Administrator and operator logs ....................................................................................................................11

12.4.4 Clock synchronization ..............................................................................................................................................12

12.5 Control of operational software ............................................................................................................................................12

12.6 Technical vulnerability management ...............................................................................................................................12

12.7 Information systems audit considerations ..................................................................................................................12

13 Communications security ........................................................................................................................................................................12

13.1 Network security management .............................................................................................................................................12

13.2 Information transfer .......................................................................................................................................................................12

13.2.1 Information transfer policies and procedures ....................................................................................12

13.2.2 Agreements on information transfer ..........................................................................................................12

13.2.3 Electronic messaging ................................................................................................................................................12

13.2.4 Confidentiality or non-disclosure agreements ...................................................................................12

14 System acquisition, development and maintenance ....................................................................................................13

15 Supplier relationships .................................................................................................................................................................................13

16 Information security incident management ........................................................................................................................13

16.1 Management of information security incidents and improvements .....................................................13

16.1.1 Responsibilities and procedures .....................................................................................................................13

16.1.2 Reporting information security events .....................................................................................................13

16.1.3 Reporting information security weaknesses ........................................................................................13

16.1.4 Assessment of and decision on information security events .................................................13

16.1.5 Response to information security incidents .........................................................................................14

16.1.6 Learning from information security incidents ....................................................................................14

16.1.7 Collection of evidence ........................................................................................................................................... ....14

17 Information security aspects of business continuity management .............................................................14

18 Compliance ..............................................................................................................................................................................................................14

18.1 Compliance with legal and contractual requirements .......................................................................................14

18.2 Information security reviews ..................................................................................................................................................14

18.2.1 Independent review of information security .......................................................................................14

18.2.2 Compliance with security policies and standards ...........................................................................14

18.2.3 Technical compliance review .............................................................................................................................14

iv © ISO/IEC 2019 – All rights reserved
---------------------- Page: 10 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)

Annex A (normative) Public cloud PII processor extended control set for PII protection ........................15

Bibliography .............................................................................................................................................................................................................................23

© ISO/IEC 2019 – All rights reserved v
---------------------- Page: 11 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Foreword

ISO (the International Organization for Standardization) and IEC (the International Electrotechnical

Commission) form the specialized system for worldwide standardization. National bodies that are

members of ISO or IEC participate in the development of International Standards through technical

committees established by the respective organization to deal with particular fields of technical

activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international

organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the

work. In the field of information technology, ISO and IEC have established a joint technical committee,

ISO/IEC JTC 1.

The procedures used to develop this document and those intended for its further maintenance are

described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for

the different types of document should be noted. This document was drafted in accordance with the

editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).

Attention is drawn to the possibility that some of the elements of this document may be the subject

of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent

rights. Details of any patent rights identified during the development of the document will be in the

Introduction and/or on the ISO list of patent declarations received (see www .iso .org/patents).

Any trade name used in this document is information given for the convenience of users and does not

constitute an endorsement.

For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and

expressions related to conformity assessment, as well as information about ISO's adherence to the

World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www .iso

.org/iso/foreword .html.

This document was prepared by Technical Committee ISO/IEC JTC 1, Information technology,

Subcommittee SC 27, IT Security techniques.

This second edition cancels and replaces the first edition (ISO/IEC 27018:2014), of which it constitutes

a minor revision. The main change compared to the previous edition is the correction of an editorial

mistake in Annex A.

Any feedback or questions on this document should be directed to the user’s national standards body. A

complete listing of these bodies can be found at www .iso .org/members .html.
vi © ISO/IEC 2019 – All rights reserved
---------------------- Page: 12 ----------------------
SIST EN ISO/IEC 27018:2020
ISO/IEC 27018:2019(E)
Introduction
0.1 Background and context

Cloud service providers who process Personally Identifiable Information (PII) under contract to their

customers need to operate their services in ways that allow both parties to meet the requirements

of applicable legislation and regulations covering the protection of PII. The requirements and the

way in which the requirements are divided between the cloud service provider and its customers

vary according to legal jurisdiction, and according to the terms of the contract between the cloud

service provider and the customer. Legislation which governs how PII is allowed to be processed (i.e.

collected, used, transferred and disposed of) is sometimes referred to as data protection legislation;

PII is sometimes referred to as personal data or personal information. The obligations falling on a PII

processor vary from jurisdiction to jurisdiction, which makes it challenging for businesses providing

cloud computing services to operate multinationally.

A public cloud service provider is a “PII processor” when it processes PII for and according to the

instructions of a cloud service customer. The cloud service customer, who has the contractual

relationship with the public cloud PII processor, can range from a natural person, a “PII principal”,

processing his or her own PII in the cloud, to an organization, a “PII controller”, processing PII relating

to many PII principals. The cloud service customer can authorize one or more cloud service users

associated with it to use the services made available to it under its contract with the public cloud

PII processor. Note that the cloud service customer has authority over the process

...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.