ADR-0019: Data protection certification
- Status
-
proposed
- Date
-
2026-03-10
- Group
-
cross-cutting
- Depends-on
-
ADR-0016
Context
Government workloads process personal data and sensitive government information. GDPR compliance is a legal requirement, not a choice. The question is which certification framework to adopt to demonstrate data protection beyond legal compliance.
Options
Option 1: ISO 27018 (PII protection in public cloud)
-
Pros: cloud-specific data protection standard; extends ISO 27001 with PII controls; covers consent, data minimization, transparency, and sub-processor management; recognized by EU data protection authorities; complements ISO 27001 + 27017 (ADR-0018) naturally
-
Cons: focused on PII, does not cover all government data classifications; code of practice, not separately certifiable
Option 2: GDPR compliance program only (no additional certification)
-
Pros: legal compliance is mandatory anyway; no additional certification cost; DPIA and records of processing cover the basics
-
Cons: no independent verification; "we comply with GDPR" is a claim without evidence; does not differentiate the platform
Option 3: ISO 27018 + ISAE 3000 Type II assurance report
-
Pros: ISO 27018 for technical controls; ISAE 3000 provides independent third-party assurance over a period; strongest evidence of data protection for procurement evaluations
-
Cons: ISAE 3000 is expensive and time-consuming; may be premature for initial platform launch
Decision
ISO 27018 as part of the ISO 27001 certification scope (ADR-0018). This extends the ISMS with cloud-specific PII controls at minimal additional cost since it shares the same audit framework. ISAE 3000 assurance can be pursued later when the platform is operational and has a track record to audit.
Consequences
-
PII controls from ISO 27018 must be included in the ISO 27001 Statement of Applicability
-
Data processing agreements must reflect ISO 27018 requirements
-
Tenant data residency enforcement (all data stays within the platform’s sovereign boundary) must be architecturally guaranteed, not just policy
-
Sub-processor management must be formalized