ISO 27018
Code of practice for PII protection in public cloud processors
SAMA CSF
Saudi regulatory framework for financial cybersecurity compliance
Quick Verdict
ISO 27018 provides voluntary cloud PII privacy controls globally for CSPs, while SAMA CSF mandates comprehensive cybersecurity maturity for Saudi financial firms. CSPs adopt 27018 for trust and procurement; Saudi banks use CSF for regulatory compliance and resilience.
ISO 27018
ISO/IEC 27018:2025 Code of practice for PII protection in public clouds
Key Features
- Privacy-specific controls for public cloud PII processors
- Mandates subprocessor transparency and disclosure
- Prohibits PII use for marketing without consent
- Requires customer breach notification procedures
- Integrates as extension to ISO 27001 audits
SAMA CSF
SAMA Cyber Security Framework Version 1.0
Key Features
- Six-level maturity model targeting Level 3 minimum
- Four core domains with detailed subdomains
- Principle-based controls aligned to NIST/ISO
- Mandatory board oversight and CISO role
- Third-party risk management requirements
Detailed Analysis
A comprehensive look at the specific requirements, scope, and impact of each standard.
ISO 27018 Details
What It Is
ISO/IEC 27018:2025 is a code of practice extending ISO 27001 and ISO 27002 for protecting personally identifiable information (PII) in public clouds where providers act as PII processors. Its primary scope targets cloud-specific privacy risks like multi-tenancy and cross-border flows, using a risk-based approach integrated into an Information Security Management System (ISMS).
Key Components
- Core domains: transparency, contractual obligations, data subject rights support, breach management, data minimization.
- ~25-30 additional privacy controls mapped to ISO 27001 Annex A (93 controls).
- Built on principles: consent, purpose limitation, accountability.
- Assessed via ISO 27001 audits; no standalone certification.
Why Organizations Use It
Enhances trust, accelerates procurement, aligns with GDPR Article 28, reduces risk in cloud outsourcing. Provides competitive differentiation for CSPs, favorable insurance terms, and evidence of due care.
Implementation Overview
Conduct gap analysis against existing ISMS, update Statement of Applicability, implement controls like subprocessor disclosure. Suited for CSPs of all sizes; requires annual audits post-ISO 27001 certification. Focuses on documentation, training, technical safeguards.
SAMA CSF Details
What It Is
The Saudi Arabian Monetary Authority Cyber Security Framework (SAMA CSF), Version 1.0 (May 2017), is a mandatory regulatory framework for SAMA-regulated financial institutions in Saudi Arabia. It provides a principle-based, outcome-oriented approach to cybersecurity governance, focusing on detecting, resisting, responding to, and recovering from cyber threats across information assets.
Key Components
- Four principal **domainsCyber Security Leadership & Governance, Risk Management & Compliance, Operations & Technology, Third-Party Cyber Security.
- Numerous subdomains with principles, objectives, and control considerations (over 100 subcontrols).
- Six-level maturity model (Level 0-5), with Level 3 (structured/formalized) as regulatory baseline.
- Built on NIST, ISO 27001, PCI-DSS; enforced via self-assessments and SAMA audits.
Why Organizations Use It
- Mandatory compliance for banks, insurers, etc., avoiding penalties and scrutiny.
- Enhances resilience, reduces incident risks, enables efficiency and partnerships.
- Builds stakeholder trust, competitive edge in digital finance.
Implementation Overview
- Phased roadmap: gap analysis, risk assessment, control deployment, monitoring.
- Applies to all SAMA entities; scalable by size.
- Requires self-assessments, evidence portfolios; no external certification.
Key Differences
| Aspect | ISO 27018 | SAMA CSF |
|---|---|---|
| Scope | PII protection in public clouds for processors | Comprehensive cybersecurity across financial operations |
| Industry | Cloud service providers globally, all sectors | Saudi financial institutions (banks, insurance) only |
| Nature | Voluntary code of practice, ISO 27001 extension | Mandatory regulatory framework for compliance |
| Testing | Assessed in ISO 27001 audits, annual surveillance | Periodic self-assessments, SAMA supervisory audits |
| Penalties | Loss of alignment/audit failure, no legal fines | Fines, license suspension, regulatory enforcement |
Scope
Industry
Nature
Testing
Penalties
Frequently Asked Questions
Common questions about ISO 27018 and SAMA CSF
ISO 27018 FAQ
SAMA CSF FAQ
You Might also be Interested in These Articles...

NIST CSF 2.0 Supply Chain Risk Management: Complete Playbook with Profiles, Tiers, and Vendor Assessment Templates
Master NIST CSF 2.0 ID.SC supply chain risk management with vendor assessment templates, profile gap analysis, and tier strategies. Mitigate third-party threats

From Data Fragments to Strategic Insight: Powering Intelligent Risk Management with Integrated Compliance Monitoring
Transform data fragments into strategic insights with integrated compliance monitoring. Automate real-time risk management, ensure GDPR & SOC 2 compliance, and

CIS Controls v8.1, Operationalized: Top 10 Reasons Compliance Monitoring Software Accelerates Real-World Implementation
Operationalize CIS Controls v8.1 with compliance monitoring software. Turn checklists into dashboards, tickets, and audit-proof workflows. Top 10 reasons it acc
Run Maturity Assessments with GRADUM
Transform your compliance journey with our AI-powered assessment platform
Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.
Check out these other Gradum.io Standards Comparison Pages
PIPL vs CCPA
Compare PIPL vs CCPA: China's GDPR-like law vs California's consumer rights powerhouse. Unpack extraterritorial scope, fines to 5% revenue, rights & compliance strategies for global firms. Dive in now!
Australian Privacy Act vs ISO 28000
Compare Australian Privacy Act vs ISO 28000: Principles-based privacy (APPs, NDB) meets supply chain security standards. Uncover gaps, risks, reforms & strategies for compliance. Safeguard data now!
COBIT vs ISO/IEC 42001:2023
Compare COBIT vs ISO/IEC 42001:2023—IT governance meets AI management. Tailor I&T via COBIT's 40 objectives or secure AI lifecycles with PDCA & Annex A. Boost compliance now!