Standards Comparison

    ISO 27018

    Voluntary
    2019

    Code of practice for PII protection in public cloud processors

    VS

    SAMA CSF

    Mandatory
    2017

    Saudi regulatory framework for financial cybersecurity compliance

    Quick Verdict

    ISO 27018 provides voluntary cloud PII privacy controls globally for CSPs, while SAMA CSF mandates comprehensive cybersecurity maturity for Saudi financial firms. CSPs adopt 27018 for trust and procurement; Saudi banks use CSF for regulatory compliance and resilience.

    Cloud Privacy

    ISO 27018

    ISO/IEC 27018:2025 Code of practice for PII protection in public clouds

    Cost
    €€€
    Complexity
    Medium
    Implementation Time
    6-12 months

    Key Features

    • Privacy-specific controls for public cloud PII processors
    • Mandates subprocessor transparency and disclosure
    • Prohibits PII use for marketing without consent
    • Requires customer breach notification procedures
    • Integrates as extension to ISO 27001 audits
    Cybersecurity

    SAMA CSF

    SAMA Cyber Security Framework Version 1.0

    Cost
    €€€€
    Complexity
    High
    Implementation Time
    6-12 months

    Key Features

    • Six-level maturity model targeting Level 3 minimum
    • Four core domains with detailed subdomains
    • Principle-based controls aligned to NIST/ISO
    • Mandatory board oversight and CISO role
    • Third-party risk management requirements

    Detailed Analysis

    A comprehensive look at the specific requirements, scope, and impact of each standard.

    ISO 27018 Details

    What It Is

    ISO/IEC 27018:2025 is a code of practice extending ISO 27001 and ISO 27002 for protecting personally identifiable information (PII) in public clouds where providers act as PII processors. Its primary scope targets cloud-specific privacy risks like multi-tenancy and cross-border flows, using a risk-based approach integrated into an Information Security Management System (ISMS).

    Key Components

    • Core domains: transparency, contractual obligations, data subject rights support, breach management, data minimization.
    • ~25-30 additional privacy controls mapped to ISO 27001 Annex A (93 controls).
    • Built on principles: consent, purpose limitation, accountability.
    • Assessed via ISO 27001 audits; no standalone certification.

    Why Organizations Use It

    Enhances trust, accelerates procurement, aligns with GDPR Article 28, reduces risk in cloud outsourcing. Provides competitive differentiation for CSPs, favorable insurance terms, and evidence of due care.

    Implementation Overview

    Conduct gap analysis against existing ISMS, update Statement of Applicability, implement controls like subprocessor disclosure. Suited for CSPs of all sizes; requires annual audits post-ISO 27001 certification. Focuses on documentation, training, technical safeguards.

    SAMA CSF Details

    What It Is

    The Saudi Arabian Monetary Authority Cyber Security Framework (SAMA CSF), Version 1.0 (May 2017), is a mandatory regulatory framework for SAMA-regulated financial institutions in Saudi Arabia. It provides a principle-based, outcome-oriented approach to cybersecurity governance, focusing on detecting, resisting, responding to, and recovering from cyber threats across information assets.

    Key Components

    • Four principal **domainsCyber Security Leadership & Governance, Risk Management & Compliance, Operations & Technology, Third-Party Cyber Security.
    • Numerous subdomains with principles, objectives, and control considerations (over 100 subcontrols).
    • Six-level maturity model (Level 0-5), with Level 3 (structured/formalized) as regulatory baseline.
    • Built on NIST, ISO 27001, PCI-DSS; enforced via self-assessments and SAMA audits.

    Why Organizations Use It

    • Mandatory compliance for banks, insurers, etc., avoiding penalties and scrutiny.
    • Enhances resilience, reduces incident risks, enables efficiency and partnerships.
    • Builds stakeholder trust, competitive edge in digital finance.

    Implementation Overview

    • Phased roadmap: gap analysis, risk assessment, control deployment, monitoring.
    • Applies to all SAMA entities; scalable by size.
    • Requires self-assessments, evidence portfolios; no external certification.

    Key Differences

    Scope

    ISO 27018
    PII protection in public clouds for processors
    SAMA CSF
    Comprehensive cybersecurity across financial operations

    Industry

    ISO 27018
    Cloud service providers globally, all sectors
    SAMA CSF
    Saudi financial institutions (banks, insurance) only

    Nature

    ISO 27018
    Voluntary code of practice, ISO 27001 extension
    SAMA CSF
    Mandatory regulatory framework for compliance

    Testing

    ISO 27018
    Assessed in ISO 27001 audits, annual surveillance
    SAMA CSF
    Periodic self-assessments, SAMA supervisory audits

    Penalties

    ISO 27018
    Loss of alignment/audit failure, no legal fines
    SAMA CSF
    Fines, license suspension, regulatory enforcement

    Frequently Asked Questions

    Common questions about ISO 27018 and SAMA CSF

    ISO 27018 FAQ

    SAMA CSF FAQ

    You Might also be Interested in These Articles...

    Run Maturity Assessments with GRADUM

    Transform your compliance journey with our AI-powered assessment platform

    Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.

    100+ Standards & Regulations
    AI-Powered Insights
    Collaborative Assessments
    Actionable Recommendations

    Check out these other Gradum.io Standards Comparison Pages