Standard · ISO/IEC 27701:2025

ISO/IEC 27701 — privacy as a certifiable management system.

Where the rest of this site covers the regulations privacy programs must comply with, ISO/IEC 27701 is something different — a voluntary certifiable standard for how a privacy program is built and run. Released in second edition on 14 October 2025, it is the international benchmark for Privacy Information Management Systems (PIMS), now standalone for the first time and no longer dependent on ISO 27001 certification. For organisations whose privacy posture needs external validation — vendor due diligence, regulator credibility, board assurance — ISO 27701 is the most widely recognised mechanism.

Standard ISO/IEC 27701:2025Edition 2 · Released 14 Oct 2025
Status StandaloneNo longer requires ISO 27001
Annex A controls 78 total31 + 18 + 29 control families
Transition deadline October 2028From 2019 to 2025 edition
01 — The 2025 transformation

From extension to standard.

The most significant change in the 2025 edition isn't structural — it's strategic. ISO/IEC 27701 was originally designed in 2019 as an extension to ISO/IEC 27001, meaning organisations could only certify their PIMS if they already held ISO 27001 certification. The October 2025 second edition removes that dependency. Privacy management can now be certified as a discipline in its own right, without requiring a complete ISMS first. This dramatically widens accessibility — and changes how privacy-led organisations should think about certification.

Edition 1 · 2019 Withdrawn

Extension to ISO 27001

Title: Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management.

  • Required existing ISO 27001 certification as a prerequisite
  • Privacy controls layered onto an ISMS-anchored framework
  • Two separate annexes — one for controllers, one for processors
  • Certification only available to organisations with full ISMS
  • Higher barrier to entry for privacy-led organisations
Edition 2 · 2025 Current

Standalone PIMS standard

Title: Information security, cybersecurity and privacy protection — Privacy information management systems — Requirements and guidance.

  • Standalone — can be implemented and certified independently
  • Full Plan-Do-Check-Act management system structure
  • Annex A consolidated; 78 controls in three tables
  • 29 new information security controls integrated
  • Materially more accessible to privacy-first organisations

Existing ISO 27701 certifications remain valid through October 2028. Organisations holding 2019-edition certificates have a three-year transition window to migrate to 2025. The migration is not a fundamental rebuild — most existing controls map across — but the structural changes (consolidated Annex A, 29 new IS controls, standalone clauses) require formal re-audit. Practitioners should plan transition work to land well before the deadline rather than at it.

02 — Management system anatomy

Seven clauses, one management system.

Clauses 4 to 10 form the operational heart of ISO 27701. They follow the standard ISO management-system structure used across ISO 27001, ISO 9001, ISO 42001 and others — the same Plan-Do-Check-Act cycle adapted to privacy. For organisations already running an ISO 27001 ISMS, the PIMS structure is immediately familiar; for privacy-first organisations, this is the operating model the standard expects.

04
Plan · Foundation Context of the organisation

Understanding the organisation, its context, interested parties, scope of the PIMS, and the boundaries within which privacy obligations operate. The starting work — and the work most often done loosely.

05
Plan · Direction Leadership

Top management commitment, privacy policy, organisational roles, responsibilities, authorities. The DPO function and accountability ladder live here. Senior buy-in needs to be visible, not assumed.

06
Plan · Risk Planning

Privacy risk assessment, risk treatment, privacy objectives, planning of changes. Privacy Impact Assessments (PIAs / DPIAs) sit here; the risk-driven nature of the entire framework is grounded in this clause.

07
Do · Enablement Support

Resources, competence, awareness, communication, documented information. The capability-building work — and the documentation discipline auditors will examine first.

08
Do · Execution Operation

Operational planning and control, privacy risk assessment, privacy risk treatment in practice. Where the controls actually run — and where the evidence of operating effectiveness gets generated.

09
Check · Evidence Performance evaluation

Monitoring, measurement, analysis, evaluation, internal audit, management review. The measurement layer that makes effectiveness demonstrable. KPIs, metrics, audit cadence all live here.

10
Act · Continual improvement Improvement

Nonconformity and corrective action, continual improvement of the PIMS. New as a dedicated clause in the 2025 edition. The closing of the loop — and where most certifications stall after first audit.

03 — The Annex A control library

Seventy-eight controls. Three tables.

The substantive heart of ISO 27701 is Annex A — the catalogue of privacy and security controls organisations select from to build their PIMS. The 2025 edition consolidates the previously separate controller and processor annexes into a single Annex A with three tables, totalling 78 controls. This is where the standard's day-to-day operational shape lives; certification audits assess implementation of selected controls against their respective objectives.

Annex A.1
31 PII Controller controls

Controls for PII Controllers

For organisations determining the purposes and means of processing personal data. The largest control set — covers consent, lawful basis, data subject rights, transparency, purpose limitation, and accountability obligations. Typical baseline for any organisation that processes its own customers' or employees' data.

Topic areas
  • Conditions for collection & processing
  • Obligations to PII principals
  • Privacy by design & by default
  • PII sharing, transfer & disclosure
Annex A.2
18 PII Processor controls

Controls for PII Processors

For organisations processing personal data on behalf of a controller. Narrower set — focused on processor-specific obligations: documented instruction adherence, sub-processor governance, controller assistance, transparency to controllers, return / deletion at engagement end. Essential for any B2B service provider handling client personal data.

Topic areas
  • Conditions for collection & processing
  • Obligations to PII principals (via controller)
  • Privacy by design & by default
  • PII sharing, transfer & disclosure (under controller instruction)
Annex A.3
29 Information security controls

Information security controls

New in the 2025 edition. Replaces the prior dependency on ISO 27001's Annex A. Provides a self-contained set of information security controls calibrated for privacy contexts. Covers organisational, people, physical and technological controls — the security baseline a standalone PIMS needs.

Topic areas
  • Organisational security controls
  • People security controls
  • Physical security controls
  • Technological security controls

Organisations select applicable controls based on their controller / processor status. A pure controller picks from Annex A.1 plus A.3. A pure processor picks from Annex A.2 plus A.3. Most organisations operate as both — a SaaS company is processor for its customers' data and controller for its own employee and prospect data — and selects across all three tables. The Statement of Applicability (SoA) documents which controls are in scope and why.

04 — Mapping to privacy regulations

How the controls actually support compliance.

ISO 27701 doesn't guarantee regulatory compliance — no framework does. But its control library maps directly onto the substantive obligations imposed by GDPR, KSA PDPL, UAE PDPL, India DPDP and other regimes. For organisations needing to demonstrate compliance to regulators, customers or auditors, ISO 27701 provides the structured evidence layer. The matrix below shows the practical mapping for the most enforcement-sensitive obligations.

Regulatory obligation ISO 27701:2025 control mapping
Lawful basis for processing GDPR Art. 6 · KSA PDPL Art. 5 · UAE PDPL Art. 4 · DPDP s.4-7 Identification, documentation and demonstration of legal basis for each processing activity. Consent management mechanics included.
A.1 — Conditions for collection Purposes & lawful basis Consent management
Data subject rights GDPR Arts. 12-22 · KSA PDPL Arts. 4, 9-10 · UAE PDPL Arts. 13-18 Operational mechanisms to honour rights of access, rectification, erasure, objection, portability, automated-decision restrictions. Channel infrastructure plus response governance.
A.1 — Obligations to PII principals Rights handling
Records of Processing (RoPA) GDPR Art. 30 · KSA PDPL Art. 31 · UAE PDPL Arts. 7, 8 · DPDP s.8(8) Records of processing activities for both controller and processor roles. Meta-data structure, retention, accessibility for regulator inspection.
A.1 / A.2 — Documentation Processing register
Privacy by design & by default GDPR Art. 25 · UAE Child Safety · DPDP s.8(4) Embedded privacy considerations across product lifecycle. Default settings configured for minimum data exposure. Engineering-side controls.
A.1 / A.2 — Privacy by design Default settings
Processor governance GDPR Art. 28 · KSA PDPL Art. 7 · UAE PDPL Art. 8 Documented processing instructions, sub-processor consent regime, controller assistance obligations, audit cooperation, deletion / return.
A.2 — Processor obligations Sub-processor governance
Security of processing GDPR Art. 32 · KSA PDPL Art. 19 · UAE PDPL Arts. 19-20 · DPDP s.8(5) Technical and organisational measures appropriate to risk. Annex A.3's 29 information security controls cover encryption, access control, monitoring, incident response, secure development.
A.3 — Org. security A.3 — Tech. security A.3 — Physical security
Personal data breach response GDPR Arts. 33-34 · KSA PDPL Art. 20 · UAE PDPL Art. 9 · DPDP s.8(6) Incident detection, classification, notification protocol to supervisory authority and affected individuals, root cause and corrective action discipline.
A.1 — Breach notification A.3 — Incident response
Privacy / Data Protection Impact Assessment GDPR Art. 35 · UAE PDPL Art. 21 · DPDP s.10 PIA / DPIA methodology, trigger identification, assessment workflow, sign-off governance, DPIA library maintenance.
A.1 — Privacy impact assessment Risk assessment
DPO function GDPR Art. 37 · KSA PDPL Art. 32 · UAE PDPL Arts. 10-11 Designated privacy function with appropriate independence, expertise, reporting line. Notification to regulator. Defined responsibilities.
Clause 5 — Leadership Roles & responsibilities
International / cross-border transfer GDPR Ch. V · KSA PDPL Art. 29 · UAE PDPL Arts. 22-23 · DPDP s.16 Transfer mechanism inventory, adequacy assessment, contractual safeguards (SCCs / equivalent), Transfer Impact Assessment where required, sub-processor location governance.
A.1 / A.2 — PII transfer Transfer governance

ISO 27701 certification doesn't make an organisation GDPR-compliant on its own. It demonstrates that the organisation runs a structured PIMS aligned to the relevant control objectives — which is materially different from substantive regulatory compliance. The regulator still assesses whether obligations are met under their specific framework. But certification provides defensible evidence of program maturity, accelerates vendor due diligence, and gives boards an external assurance signal that pure self-attestation cannot.

05 — Certification pathway

From scoping to certificate.

The path from an unplanned PIMS to a certified one runs through five distinct phases. Total elapsed time depends on starting maturity — organisations with an existing ISO 27001 ISMS and a functioning DPO typically reach Stage 2 audit in 6 — 9 months; organisations starting from scratch typically take 9 — 14 months. Surveillance audits then run annually, with re-certification every three years.

Phase 01
1

Scoping & gap assessment

Define PIMS scope. Diagnostic against the standard. Gap report and remediation plan.

Phase 02
2

Build & implement

PIMS documentation, control implementation, Statement of Applicability, evidence cadence.

Phase 03
3

Internal audit

Independent internal audit against the standard. Management review. Pre-certification readiness.

Phase 04
4

Stage 1 + 2 audits

Documentation review by certification body; on-site Stage 2 effectiveness audit; nonconformity remediation.

Phase 05
5

Certificate & surveillance

Three-year certificate. Annual surveillance audits. Continual improvement discipline.

06 — Transition timeline

Three years to migrate.

Organisations holding 2019-edition certificates must migrate to the 2025 edition by October 2028. The good news: the migration is not a fundamental rebuild — most existing controls map across — but the structural changes (Annex A consolidation, 29 new IS controls if not previously running ISO 27001, standalone clauses) require formal re-audit. Plan transition work to land at least six months before the deadline, not at it.

Released 14 October 2025

ISO/IEC 27701:2025 published as Edition 2. Companion ISO/IEC 27706:2025 (certification body guidance) released alongside. Three-year transition window opens.

Migration window 2026 — 2028

2019-edition certified organisations conduct gap analysis, update PIMS documentation, complete transition audit. Accreditation body guidance from IAF, UKAS, ANAB published during early 2026.

Hard deadline October 2028

Existing 2019-edition certificates expire. Continued certification requires successful migration audit before this date. Certifications not migrated lapse.

07 — What the work looks like

Eleven workstreams ISO 27701 actually requires.

The path to ISO 27701 certification splits into eleven workstreams. Some are universal — every organisation needs them; others are scope-dependent (controller-only vs processor-only vs both). The sequencing matters: scoping first, then build, then audit; trying to compress the sequence typically extends the timeline rather than shortening it.

W-01

PIMS scoping

Definition of organisational and processing scope for the PIMS. Boundary decisions: which entities, which processing activities, which products. Scope decisions made here drive every subsequent workstream.

W-02

Gap assessment

Diagnostic against ISO 27701:2025 clauses 4 — 10 and Annex A controls. Maturity scoring, gap inventory, remediation prioritisation. The map of what's already in place vs what needs building.

W-03

Statement of Applicability

Selection and justification of in-scope Annex A controls. Controller / processor / dual-status determination per processing activity. Documented rationale for excluded controls.

W-04

PIMS documentation

Privacy policy, processing register (RoPA), risk register, treatment plan, control documentation. The document set auditors will work through; needs to be both auditable and operationally meaningful.

W-05

Control implementation

Implementation of selected Annex A controls. Operational mechanism build for rights handling, breach response, transfer governance, vendor / sub-processor management. The largest workstream by effort.

W-06

Information security overlay

Annex A.3's 29 information security controls. For organisations without ISO 27001, this is the substantive security build; for ISO 27001-certified organisations, alignment work and documentation reuse.

W-07

Risk assessment & treatment

Privacy risk methodology, identification, assessment, treatment, residual risk acceptance. PIA / DPIA library aligned to the methodology. Continuous re-assessment cycle defined.

W-08

Awareness & competence

Training plan, role-specific competence requirements, evidence of awareness. Frequently underestimated workstream — auditors specifically test whether staff understand the privacy obligations relevant to their roles.

W-09

Internal audit programme

Internal audit methodology, programme schedule, auditor independence and competence, audit evidence retention. Required by the standard; certification body will examine internal audit findings as part of Stage 2.

W-10

Management review

Top-management review cadence, agenda content, decision documentation. The clause 9.3 requirement that demonstrates leadership engagement with the PIMS — a regular failure point for organisations without strong management discipline.

W-11

Certification body engagement

Selection of accredited certification body, Stage 1 and Stage 2 audit scheduling, nonconformity response, ongoing surveillance audit cadence. The external-facing workstream that runs in parallel with implementation.

08 — How this is delivered

Three engagement shapes.

ISO 27701 work is delivered through one of three engagement shapes — depending on whether the organisation is starting from scratch, transitioning from the 2019 edition, or maintaining post-certification. Most full implementations run as substantial project engagements; transition work is typically lighter; ongoing surveillance maintenance fits well into a retainer.

09 — Common questions

Things people ask on first call.

Common questions on ISO 27701 in late 2025 / early 2026 — particularly around the 2025 edition's standalone status, the transition implications, and whether certification is worth pursuing for organisations whose primary driver is regulatory compliance rather than external assurance.

Do we still need ISO 27001 first?
No — that's the headline change in the 2025 edition. Until October 2025, ISO 27701 was an extension and required ISO 27001 certification first. The 2025 edition is standalone — organisations can pursue ISO 27701 certification on its own merit, without holding ISO 27001. That said, for organisations that already hold ISO 27001, integrating PIMS with the existing ISMS remains the most efficient operating model — most controls overlap, and running both as an integrated management system reduces audit effort and documentation duplication. Standalone certification is the new option, not the new default.
Does ISO 27701 certification make us GDPR-compliant?
No — and any vendor or consultant claiming otherwise is overselling the standard. ISO 27701 demonstrates that an organisation runs a structured PIMS aligned to the standard's control objectives. Substantive regulatory compliance under GDPR (or KSA PDPL, UAE PDPL, India DPDP) is assessed by the relevant regulator under the relevant law's specific obligations. What ISO 27701 does provide is defensible evidence of program maturity, accelerated vendor due diligence, board-level external assurance, and structured operational controls that map onto regulatory obligations. It is a strong positive signal — not a substitute for regulatory analysis.
When should we transition from 2019 to 2025?
The hard deadline is October 2028. Practitioners should plan transition work to complete by mid-2028, leaving at least a six-month buffer for transition audit scheduling and any nonconformity remediation. Most accreditation bodies (IAF, UKAS, ANAB, others) are publishing detailed transition guidance during early 2026 — once that's available, organisations can map their specific certification body's expected approach. Don't leave this to 2028; certification body capacity will tighten significantly as the deadline approaches.
How long does first-time certification take?
Total elapsed time depends on starting maturity. Organisations with existing ISO 27001 ISMS, mature DPO function, and operating privacy controls typically reach Stage 2 audit in 6 — 9 months. Organisations starting from scratch — no existing ISMS, no formal privacy program, no documented controls — typically take 9 — 14 months. The work splits roughly: 30% scoping and documentation, 50% control implementation and internal audit, 20% certification body engagement. Compressing the sequence usually extends the timeline rather than shortening it.
What's in the new Annex A.3 (29 IS controls)?
The 29 information security controls in Annex A.3 cover the four control categories from ISO 27002:2022 — organisational, people, physical, and technological. They include access management, encryption, secure development, monitoring and logging, vulnerability management, incident response, supplier security, and physical access controls. For organisations holding ISO 27001 certification, these controls are already substantially in place via ISO 27001 Annex A — the work is documentation alignment rather than substantive build. For standalone ISO 27701 organisations, Annex A.3 is the security baseline needed to run a defensible PIMS without the broader ISMS.
How does ISO 27701 relate to ISO 42001 (AI management)?
ISO 42001:2023 is the management system standard for Artificial Intelligence — released in December 2023 and now seeing increasing adoption. ISO 27701 covers privacy; ISO 42001 covers AI governance. They overlap meaningfully where AI systems process personal data — DPIAs become AI impact assessments, automated decision-making controls overlap with AI explainability requirements, model training data governance touches both. For organisations with substantial AI operations, an integrated management system covering ISO 27001 + ISO 27701 + ISO 42001 is increasingly the working approach. The structural alignment across all three (same Plan-Do-Check-Act backbone) makes integration tractable.
Is the certification worth pursuing?
Depends on the driver. Strong yes if: vendor due diligence is closing deals more slowly than it should, customers are asking for external privacy assurance, the board wants third-party validation rather than internal attestation, multiple regulatory regimes are in scope and unified evidence helps. Less compelling if: the organisation operates in a single jurisdiction with a strong DPO, customers don't ask, and the program already has documented evidence of controls. Many organisations build to ISO 27701's structure and controls without pursuing certification — getting much of the operational benefit without the audit cost.
What does ongoing maintenance look like post-certification?
Annual surveillance audits (Years 1 and 2 after certification), then re-certification audit in Year 3. Each surveillance audit examines a subset of controls and the management system's effectiveness; re-certification examines the full scope. Internally, the standard requires documented internal audit cycles, management review cadence, continual improvement actions on identified nonconformities, scope reassessment when material changes occur. Most organisations find the discipline harder than the build — first-year energy is high, by Year 2 the discipline often slackens. Surveillance audits are designed to catch this; the post-certification advisory retainer pattern exists specifically to support that ongoing discipline.

Certification is structure. Not magic.

ISO 27701 is the most widely recognised privacy management standard in the world — but it is a discipline, not a guarantee. The right question is whether the discipline matches your needs: vendor due diligence, regulator credibility, board assurance, multi-regime evidence. A 30-minute scoping call costs nothing — we will tell you honestly whether ISO 27701 makes sense for your situation, what the build looks like, and how the 2025 transition affects your timing.

Schedule a call