Standards Comparison

    CCPA

    Mandatory
    2020

    California law granting residents data privacy rights

    VS

    ISO 27018

    Voluntary
    2019

    International code of practice for PII protection in public clouds

    Quick Verdict

    CCPA mandates consumer privacy rights for California businesses handling resident data, enforced by fines and lawsuits. ISO 27018 provides voluntary cloud PII controls for processors, certified via ISO 27001 audits. Companies adopt CCPA for legal compliance, ISO 27018 for trust and procurement edge.

    Data Privacy

    CCPA

    California Consumer Privacy Act (CCPA/CPRA)

    Cost
    €€€€
    Complexity
    High
    Implementation Time
    6-12 months

    Key Features

    • Consumer rights to know, delete, opt-out, correct personal data
    • Threshold-based applicability: $25M revenue or 100K consumers/devices
    • Mandatory notices at collection and comprehensive privacy policy
    • Limits use of sensitive personal information like biometrics
    • Honors Global Privacy Control for frictionless opt-outs
    Cloud Privacy

    ISO 27018

    ISO/IEC 27018:2025 Code of practice for PII in public clouds

    Cost
    €€€
    Complexity
    Medium
    Implementation Time
    6-12 months

    Key Features

    • PII protection controls for public cloud processors
    • Extends ISO 27001 with 25-30 privacy-specific controls
    • Mandates subprocessor transparency and location disclosure
    • Requires prompt customer breach notifications
    • Enforces data minimization and secure deletion

    Detailed Analysis

    A comprehensive look at the specific requirements, scope, and impact of each standard.

    CCPA Details

    What It Is

    California Consumer Privacy Act (CCPA), as amended by California Privacy Rights Act (CPRA), is a state regulation granting California residents rights over personal information. It applies extraterritorially to for-profit businesses meeting thresholds, using a rights-based approach with consumer opt-outs and strict disclosures.

    Key Components

    • Core consumer rights: know/access, delete, opt-out of sales/sharing, correct, limit sensitive PI.
    • Notices at collection, privacy policies, vendor contracts, data mapping.
    • Built on broad personal information definition including inferences, households, devices.
    • Enforcement by CPPA and Attorney General; no certification, but audits required.

    Why Organizations Use It

    • Mandatory compliance avoids fines up to $7,500 per violation and breach litigation ($100-$750 per consumer).
    • Enhances trust, data governance, efficiency; aligns with GDPR for global ops.
    • Reduces breach risks, enables market differentiation in privacy-conscious sectors.

    Implementation Overview

    • Phased: scoping/gap analysis (0-3 months), policies/contracts (1-4 months), technical controls (2-6 months), operationalization/audits.
    • Targets large data handlers in tech, retail, finance; cross-functional teams needed.
    • Ongoing monitoring, no formal certification but internal/external audits essential.

    ISO 27018 Details

    What It Is

    ISO/IEC 27018:2025 is an international code of practice extending ISO 27001 for protecting personally identifiable information (PII) in public clouds where providers act as PII processors. It targets multi-tenant environments, using a risk-based approach with privacy-specific controls and guidance aligned to ISO 27002:2022.

    Key Components

    • Adds ~25–30 privacy controls to ISO 27001 Annex A (93 controls in organizational, people, physical, technological themes)
    • Principles: consent, purpose limitation, data minimization, accuracy, retention limits, security, transparency, accountability
    • Assessed via Statement of Applicability in ISO 27001 audits; no standalone certification

    Why Organizations Use It

    • Builds customer trust and accelerates procurement
    • Aligns with GDPR Art. 28, HIPAA processor duties
    • Enables subprocessor transparency, breach notification
    • Differentiates CSPs, aids cyber insurance, reduces outsourcing risks

    Implementation Overview

    • Integrate into existing ISO 27001 ISMS via gap analysis, SoA updates
    • Key activities: technical safeguards (encryption, logging), training, contracts
    • Suits CSPs all sizes; accredited audits with annual surveillance

    Frequently Asked Questions

    Common questions about CCPA and ISO 27018

    CCPA FAQ

    ISO 27018 FAQ

    You Might also be Interested in These Articles...

    Run Maturity Assessments with GRADUM

    Transform your compliance journey with our AI-powered assessment platform

    Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.

    100+ Standards & Regulations
    AI-Powered Insights
    Collaborative Assessments
    Actionable Recommendations

    Check out these other Gradum.io Standards Comparison Pages