ISO 27017
International code of practice for cloud security controls
ISO 27018
International code for PII protection in public cloud processors.
Quick Verdict
ISO 27017 adds cloud-specific security controls to ISO 27001 for CSPs and customers, while ISO 27018 embeds privacy controls for PII protection. Companies adopt them to prove robust cloud security and privacy postures, accelerating procurement and regulatory compliance.
ISO 27017
ISO/IEC 27017:2015 Code of practice for cloud security
Key Features
- Introduces 7 additional cloud-specific controls
- Clarifies shared responsibilities for CSPs and customers
- Provides guidance for 37 ISO 27002 controls in cloud
- Addresses virtual machine segregation and hardening
- Supports cloud service monitoring and logging
ISO 27018
ISO/IEC 27018:2025 PII protection in public clouds
Key Features
- Protects PII processed by public cloud as processors
- Enforces consent and purpose limitation restrictions
- Mandates sub-processor transparency and management
- Requires logging, monitoring, and breach notification
- Ensures secure data return and deletion on termination
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
ISO 27017 Details
What It Is
ISO/IEC 27017:2015 is a code of practice extending ISO/IEC 27002 for information security controls in cloud services. It provides cloud-specific implementation guidance within an ISO 27001 ISMS, focusing on public, private, and hybrid clouds across IaaS, PaaS, and SaaS models. Its risk-based approach adapts generic controls to cloud risks like multi-tenancy and shared responsibilities.
Key Components
- Guidance on 37 ISO 27002 controls tailored for cloud environments.
- 7 additional CLD controls covering shared roles (CLD.6.3.1), asset removal (CLD.8.1.5), virtual segregation (CLD.9.5.1), VM hardening (CLD.9.5.2), admin security (CLD.12.1.5), monitoring (CLD.12.4.5), and network alignment (CLD.15.1.3).
- Built on ISO 27001 ISMS; not standalone certification—assessed during ISO 27001 audits.
Why Organizations Use It
CSPs and customers adopt it for procurement trust, regulatory alignment (e.g., GDPR support), risk reduction in multi-tenant setups, and competitive differentiation. It clarifies responsibilities, lowers breach risks from misconfigurations, and builds stakeholder confidence.
Implementation Overview
Integrate into existing ISO 27001 ISMS via cloud risk assessments, control mapping, and joint audits (9-12 months). Applies to CSPs, customers of all sizes; requires operational maturity in monitoring and virtualization. Auditors verify during ISO 27001 Stage 2.
ISO 27018 Details
What It Is
ISO/IEC 27018:2025 is a code of practice extending ISO/IEC 27002 for protecting personally identifiable information (PII) in public cloud environments where providers act as PII processors. Its primary scope targets cloud service providers handling customer PII, using a risk-based, control-overlay approach aligned with ISO/IEC 29100 privacy principles.
Key Components
- Core themes: consent/purpose limitation, transparency, data minimization, logging/auditability, breach notification, secure deletion.
- Approximately 25-30 privacy-specific controls layered on 93 ISO 27002 controls.
- Built on ISO 27001 ISMS foundation.
- Certification via integrated audits, not standalone.
Why Organizations Use It
- Demonstrates robust PII safeguards for cloud customers.
- Meets processor obligations under privacy laws like GDPR.
- Enhances risk management in multi-tenant clouds.
- Builds trust, accelerates procurement, differentiates in market.
Implementation Overview
- Layer onto existing ISO 27001 ISMS via gap analysis.
- Key activities: control mapping, policy updates, tooling integration, audits.
- Applies to cloud processors of all sizes globally.
- Requires third-party certification with annual surveillance.
Key Differences
| Aspect | ISO 27017 | ISO 27018 |
|---|---|---|
| Scope | Cloud security controls, shared responsibility, multi-tenancy | PII protection in public clouds, privacy-centric controls |
| Industry | All cloud-using industries worldwide, CSPs and customers | Cloud processors handling PII, global with privacy focus |
| Nature | Voluntary code of practice extending ISO 27001 | Voluntary code of practice extending ISO 27001 |
| Testing | Assessed in ISO 27001 audits, no standalone certification | Assessed in ISO 27001 audits, no standalone certification |
| Penalties | No legal penalties, loss of certification alignment | No legal penalties, loss of certification alignment |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about ISO 27017 and ISO 27018
ISO 27017 FAQ
ISO 27018 FAQ
You Might also be Interested in These Articles...

NIST CSF 2.0 Plain English Decoder: Translating Govern, Supply Chain, and Core Functions from Jargon to Actionable Insights
Demystify NIST CSF 2.0 jargon with plain English tables for Govern, Supply Chain & Core Functions. Actionable steps for risk oversight & vendor management. Empo

CMMC Sustainment Mastery: Continuous Monitoring, Annual Affirmations, and Subcontractor Flow-Down Playbook
Master CMMC sustainment beyond certification: continuous monitoring dashboards, SPRS/eMASS affirmations, enforceable subcontractor clauses. Get templates for ve

Why the SEC Stepped In: The Investor-Driven Push for Cybersecurity Transparency
Discover why the SEC's 2023 cybersecurity rules treat cyber risks as material financial threats. Explore the 'stick and carrot' approach for standardized disclo
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
ISO 30301 vs 23 NYCRR 500
Compare ISO 30301 vs 23 NYCRR 500: Align records governance with NY cybersecurity for financial compliance. Boost risk management, audit readiness & certification—read now!
ISO 20000 vs MAS TRM
Discover ISO 20000 vs MAS TRM: Certifiable service management vs Singapore's tech risk guidelines. Align ITSM with cyber resilience, governance—boost compliance now!
COBIT vs ISO 27017
Compare COBIT vs ISO 27017: COBIT masters enterprise IT governance via design factors & maturity models, ISO 27017 delivers cloud-specific security controls. Choose wisely—read now!