ISO 27001 Annex A 5.34 Audit Checklist

Auditing ISO 27001 Annex A 5.34 is the technical verification of an organization’s governance over personal data to ensure regulatory compliance. The Primary Implementation Requirement is a functional Record of Processing Activities, providing the Business Benefit of mitigated legal risks and enhanced data subject trust through transparent handling.

This technical verification tool is designed for lead auditors to confirm the integrity of the organisation’s privacy governance and data handling practices. Use this checklist to validate compliance with ISO 27001 Annex A 5.34 (Privacy and protection of PII).

1. Privacy Policy and PII Handling Procedure Verified

Verification Criteria: A documented policy exists that defines the organisation’s requirements for the protection of Personally Identifiable Information (PII) in accordance with applicable laws.

Required Evidence: Approved Privacy Policy and PII Handling Procedure with explicit version control and management sign-off.

Pass/Fail Test: If the organisation lacks a formalised policy that specifically addresses the protection of PII, mark as Non-Compliant.

2. Personal Data Inventory and RoPA Confirmed

Verification Criteria: A Record of Processing Activities (RoPA) is maintained, identifying all PII categories, purposes of processing, and data flows.

Required Evidence: A current RoPA or Data Inventory mapping PII across internal systems and third-party processors.

Pass/Fail Test: If the organisation cannot identify where PII is stored or the legal basis for processing specific data categories, mark as Non-Compliant.

3. Data Protection Impact Assessment (DPIA) Execution Validated

Verification Criteria: High-risk processing activities are subjected to a formal DPIA to identify and mitigate privacy risks before processing begins.

Required Evidence: Signed DPIA reports for all major technical projects or high-risk data processing operations initiated in the current cycle.

Pass/Fail Test: If a new high-risk system (e.g., automated profiling or large-scale health data) was launched without a completed DPIA, mark as Non-Compliant.

4. Data Subject Rights Request (DSRR) Mechanism Verified

Verification Criteria: A functional process exists for data subjects to exercise their rights, including access, rectification, and erasure of their PII.

Required Evidence: DSRR Log showing timestamps for request receipt, verification, and resolution within statutory timeframes (e.g., 30 days).

Pass/Fail Test: If a sampled DSRR was not fulfilled within the legally mandated timeframe without a documented extension, mark as Non-Compliant.

5. Privacy by Design and Default Implementation Confirmed

Verification Criteria: Technical controls are implemented to ensure that only the minimum necessary PII is processed and that privacy is a default setting.

Required Evidence: Product specification documents, database schemas showing minimised data fields, or default “Opt-In” configuration screenshots.

Pass/Fail Test: If systems are found to collect PII that is not required for the stated purpose (“data hoarding”), mark as Non-Compliant.

6. Secure PII Disposal and Anonymisation Procedures Verified

Verification Criteria: PII that has reached its retention limit is securely deleted or anonymised using irreversible technical methods.

Required Evidence: Secure erasure logs or technical documentation of anonymisation/pseudonymisation algorithms (e.g., salt-hashing, k-anonymity).

Pass/Fail Test: If PII persists in production databases after its retention period has expired without a legal hold, mark as Non-Compliant.

7. Data Transfer Agreements (DTA) and SCCs Validated

Verification Criteria: Transfers of PII to third parties or across borders are governed by formal agreements that ensure equivalent levels of protection.

Required Evidence: Signed DTAs, Standard Contractual Clauses (SCCs), or International Data Transfer Agreements (IDTAs) for sampled vendors.

Pass/Fail Test: If PII is transferred to a third-country processor without a valid legal transfer mechanism or adequacy decision, mark as Non-Compliant.

8. PII Access Restriction and Least Privilege Verified

Verification Criteria: Access to systems containing PII is strictly limited to authorised personnel whose job function requires such access.

Required Evidence: Access Control Lists (ACLs) or Role-Based Access Control (RBAC) reports for primary PII repositories.

Pass/Fail Test: If “Read” or “Export” access to the PII database is granted to general IT staff who do not have a defined data-handling role, mark as Non-Compliant.

9. Privacy Awareness Training Records Identified

Verification Criteria: Personnel with access to PII receive regular training on their privacy obligations and the technical handling of personal data.

Required Evidence: Training logs showing >95% completion of privacy-specific modules (e.g., GDPR awareness) for relevant staff.

Pass/Fail Test: If staff members handling PII have not completed a privacy training module within the last 12 months, mark as Non-Compliant.

10. PII Breach Notification Procedure and Logging Confirmed

Verification Criteria: A specific process exists for detecting and notifying authorities and data subjects of PII breaches within statutory windows.

Required Evidence: Incident Management Plan with a specific “PII Breach” annex and logs of any past notifications sent to regulators (e.g., ICO).

Pass/Fail Test: If the incident procedure lacks binary criteria for determining when a PII breach must be reported to the regulator, mark as Non-Compliant.
ISO 27001 Annex A 5.34 SaaS / GRC Platform Failure Checklist
Control Requirement The ‘Checkbox Compliance’ Trap The Reality Check
PII Inventory Tool identifies “PII” based on file names or folder titles. The auditor must verify content. Automated tools miss PII buried in unstructured data or custom database fields.
Legal Basis GRC tool assumes “Legitimate Interest” for all processing. Verify the Legitimate Interest Assessment (LIA). If the balancing test isn’t documented, the legal basis is invalid.
Data Minimisation Tool checks if a “Minimisation Policy” exists. Inspect the database schema. If the system asks for “Date of Birth” but only needs “Age > 18,” it is not minimised.
Transfers SaaS tool verifies the vendor has an ISO 27001 certificate. The auditor must verify the Transfer Risk Assessment (TRA). A certificate is not a legal mechanism for cross-border PII flow.
DSRR Fulfillment Tool records that a “Request Portal” is active. Verify the outcome. Did the person actually receive all their data, or just a generic profile summary?
Retention Tool marks a task “Done” for annual data cleanup. Check the backups. PII is often deleted from production but remains indefinitely in unencrypted, unmanaged backup sets.
Breach Window Platform logs a breach as “Notified” based on a manual date. Cross-reference the Discovery Timestamp with the Notification Timestamp. 72 hours starts at discovery, not at “Management Approval.”

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top