Standards Comparison

    ISO 27018

    Voluntary
    2019

    Code of practice for PII protection in public clouds

    VS

    ISO 28000

    Voluntary
    2022

    International standard for supply chain security management systems

    Quick Verdict

    ISO 27018 protects PII in public clouds as a 27001 extension for CSPs, while ISO 28000 builds supply chain security management systems. Companies adopt 27018 for privacy trust in cloud procurement; 28000 for resilience against theft and disruptions.

    Cloud Privacy

    ISO 27018

    ISO/IEC 27018:2025 Code of practice for cloud PII processors

    Cost
    €€€
    Complexity
    Medium
    Implementation Time
    6-12 months

    Key Features

    • Provides code of practice for PII protection by cloud processors
    • Requires disclosure of subprocessors and processing locations
    • Mandates notification of PII breaches to customers
    • Prohibits using customer PII for marketing without consent
    • Adds privacy-specific controls to ISO 27001 ISMS
    Supply Chain Security

    ISO 28000

    ISO 28000:2022 Security management systems – Requirements

    Cost
    €€€€
    Complexity
    High
    Implementation Time
    12-18 months

    Key Features

    • PDCA-based security management system framework
    • Risk assessment and treatment per ISO 31000
    • Supply chain interdependencies and external controls
    • Top management leadership and policy commitment
    • Operational security plans and response structures

    Detailed Analysis

    A comprehensive look at the specific requirements, scope, and impact of each standard.

    ISO 27018 Details

    What It Is

    ISO/IEC 27018:2025 is a code of practice that extends ISO 27001 and ISO 27002 for protecting personally identifiable information (PII) in public clouds, where providers act as PII processors. Its scope focuses on cloud-specific privacy risks like multi-tenancy and cross-border flows. It employs a risk-based approach within an Information Security Management System (ISMS).

    Key Components

    • Approximately 25-30 additional privacy-specific controls mapped to ISO 27001 Annex A themes (organizational, people, physical, technological).
    • Core principles: consent/choice, purpose limitation, data minimization, transparency, accountability.
    • Built on ISO 27002 guidance; assessed during ISO 27001 audits, not standalone certification.

    Why Organizations Use It

    Cloud service providers (CSPs) adopt it for customer trust, procurement acceleration, and GDPR Article 28 alignment. It mitigates PII risks, supports insurance, and differentiates in competitive markets via audited transparency.

    Implementation Overview

    Start with gap analysis on existing ISMS, update Statement of Applicability (SoA), policies, and contracts. Implement technical safeguards like encryption and logging. Suitable for CSPs of all sizes; requires accredited audits as ISO 27001 extension with annual surveillance.

    ISO 28000 Details

    What It Is

    ISO 28000:2022 is the international standard titled Security and resilience — Security management systems — Requirements. It is a certifiable management system framework specifying requirements to establish, implement, maintain, and improve a security management system (SMS) focused on supply chain security risks. It employs a risk-based PDCA (Plan-Do-Check-Act) approach aligned with ISO 31000.

    Key Components

    • Clauses 4–10: context, leadership, planning (risks/objectives), support (resources/competence), operation (controls/plans), performance evaluation, improvement.
    • Emphasizes risk assessment/treatment, supplier controls, security plans (response/recovery).
    • Built on holistic principles; supports integration with ISO 9001, 22301, 27001.
    • Certification via accredited bodies per ISO 28003.

    Why Organizations Use It

    • Reduces supply chain disruptions, theft, compliance risks.
    • Meets contractual/partner demands, lowers insurance costs.
    • Enhances resilience, market access, stakeholder trust.

    Implementation Overview

    • Phased: gap analysis, risk assessment, controls rollout, audits, certification.
    • Applicable to all sizes/industries with supply chains; 6–36 months typical.

    Key Differences

    Scope

    ISO 27018
    PII protection in public clouds for processors
    ISO 28000
    Supply chain security management system

    Industry

    ISO 27018
    Cloud service providers, all sectors
    ISO 28000
    Logistics, manufacturing, any supply chain

    Nature

    ISO 27018
    Voluntary code of practice, extends 27001
    ISO 28000
    Voluntary certifiable management system

    Testing

    ISO 27018
    Assessed in ISO 27001 audits, annual surveillance
    ISO 28000
    Stage 1/2 certification audits, surveillance

    Penalties

    ISO 27018
    Loss of alignment claim, no legal penalties
    ISO 28000
    Loss of certification, no legal penalties

    Frequently Asked Questions

    Common questions about ISO 27018 and ISO 28000

    ISO 27018 FAQ

    ISO 28000 FAQ

    You Might also be Interested in These Articles...

    Run Maturity Assessments with GRADUM

    Transform your compliance journey with our AI-powered assessment platform

    Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.

    100+ Standards & Regulations
    AI-Powered Insights
    Collaborative Assessments
    Actionable Recommendations

    Check out these other Gradum.io Standards Comparison Pages