ISO 27001:2022

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

ISO 27001 Technical Controls

ISO 27001 Annex A 8.1: User Endpoint Devices

ISO 27001 Annex A 8.2: Privileged Access Rights

ISO 27001 Annex A 8.3: Information Access Restriction

ISO 27001 Annex A 8.4: Access To Source Code

ISO 27001 Annex A 8.5: Secure Authentication

ISO 27001 Annex A 8.6: Capacity Management

ISO 27001 Annex A 8.7: Protection Against Malware

ISO 27001 Annex A 8.8: Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9: Configuration Management 

ISO 27001 Annex A 8.10: Information Deletion

ISO 27001 Annex A 8.11: Data Masking

ISO 27001 Annex A 8.12: Data Leakage Prevention

ISO 27001 Annex A 8.13: Information Backup

ISO 27001 Annex A 8.14: Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15: Logging

ISO 27001 Annex A 8.16: Monitoring Activities

ISO 27001 Annex A 8.17: Clock Synchronisation

ISO 27001 Annex A 8.18: Use of Privileged Utility Programs

ISO 27001 Annex A 8.19: Installation of Software on Operational Systems

ISO 27001 Annex A 8.20: Network Security

ISO 27001 Annex A 8.21: Security of Network Services

ISO 27001 Annex A 8.22: Segregation of Networks

ISO 27001 Annex A 8.23: Web Filtering

ISO 27001 Annex A 8.24: Use of Cryptography

ISO 27001 Annex A 8.25: Secure Development Life Cycle

ISO 27001 Annex A 8.26: Application Security Requirements

ISO 27001 Annex A 8.27: Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28: Secure Coding

ISO 27001 Annex A 8.29: Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30: Outsourced Development

ISO 27001 Annex A 8.31: Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32: Change Management

ISO 27001 Annex A 8.33: Test Information

ISO 27001 Annex A 8.34: Protection of information systems during audit testing

Home / ISO 27001 Annex A Controls / The Ultimate Guide to ISO 27001:2022 Annex A 8.33: Test Information

The Ultimate Guide to ISO 27001:2022 Annex A 8.33: Test Information

Last updated Oct 1, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

ISO 27001 Test Information is an ISO 27001 control that requires an organisation to protect production and operational information when used for testing.

What is it?

Simply put, this control is all about keeping test data safe. Think about it: when you’re testing new software or systems, you often need data that looks like your real, confidential information (like customer names, addresses, or internal documents).

A 8.33 tells you that you must use dummy data or make sure the real data you use for testing is protected just as well as your live, operational data. You need to prevent the unauthorised disclosure, modification, or loss of data that’s used for testing purposes. It’s making sure your test environment isn’t a weak spot that hackers can sneak through!

Purpose

This is a preventive control to ensure relevance of testing and protection of operational information used for testing.

Definition

ISO 27001 defines ISO 27001 Annex A 8.33 as:

Test information should be appropriately selected, protected and managed.

ISO27001:2022 Annex A 8.33 Test Information

Applicability to Small Businesses, Tech Startups, and AI Companies

This information security control is useful for businesses of all sizes, including small businesses, tech startups, and AI companies. Examples of using this control include:

  • Small Businesses: You may not have complex testing environments, but if you take a copy of your customer database to test a new sales system, that copy must be protected.
  • Tech Startups: You are constantly building and testing! You’re likely dealing with proprietary code and potentially sensitive user data, so keeping your test environments secure is a must to protect your intellectual property and early user trust.
  • AI Companies: You rely heavily on training data and testing data to build and fine-tune your models. This data is often highly sensitive, sometimes containing personal details or proprietary information used to train your AI. A 8.33 is vital to ensure that data doesn’t leak during the development and testing of your algorithms.

Why do you need it?

You need to care for a few important reasons:

  1. Stop Data Leaks: If your test environment is less secure than your live system, a hacker can easily get to your real data that you’ve copied over for testing.
  2. Maintain Customer Trust: If you leak customer data, even from a testing server, your customers will lose faith in you.
  3. Avoid Fines: Depending on where you operate, laws like GDPR (General Data Protection Regulation) apply to test data just as much as live data. A leak can lead to huge fines.
  4. Keep it Real: If you use fake or masked data, your test results are more reliable, as you aren’t worried about accidentally modifying or destroying real customer records.

When do you need it?

You should address this control before you start any new development or testing project that requires using or simulating real data.

  • During System Development: As soon as you plan to move data from a live environment to a testing environment.
  • When You Set Up a Test Environment: You should define the security rules for the test environment right from the start.
  • As Part of Your ISO 27001 Certification Process: You need documented procedures and proof of compliance before your audit.

How do you write it?

You don’t need a super-long, complicated document. Your procedure should answer these main questions:

  1. What data is allowed in the test environment? (Only masked data? Completely fake data?)
  2. How do we get the data? (Do we use an approved masking tool? Is the transfer encrypted?)
  3. Who can access the test data and test environment? (Only approved developers? Do they use unique passwords?)
  4. How is the test data deleted or destroyed when testing is finished? (Do we have a secure deletion process?)

How do you implement it?

Implementation is all about action! Follow these steps:

  1. Data Masking/Anonymization: This is the best approach! Use tools to change real names, numbers, and addresses into realistic-looking but fake data. This way, your testing works, but the data is useless if it leaks.
  2. Access Control: Make sure the people who can access the test environment are only those who need to. Use strong authentication (like two-factor verification) and unique user IDs.
  3. Separate Environments: Keep your Live (Production) and Test systems completely separate. They should not be able to talk to each other unless absolutely necessary and only over secure, monitored links.
  4. Secure Disposal: When a testing project is done, don’t just forget about the test data. Have a plan to securely wipe or destroy it.

When it comes to testing information, in other words the information that you use in testing, the best advice for implementation is to not use production data, confidential data, personal data. Think of it this way, don’t use any data or information in test that could get you in hot water.

If you have to then you have to but here I would recommend using things such as data masking or specialist tools that turn data into test data.

What we need to do is select data and information that will ensure reliability of test results including the confidentiality, integrity and availability of the production and operational information.

Consider here the requirements of ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments.

General considerations would include

  • Access Control – having access control in place that mirrors the production environment
  • Authorisation – having a process of authorising the transfer of data between environments
  • Logging – having logs of the transfer of information between environments
  • Deletion – deleting testing data immediately after use
  • Test data is for testing only.

Depending on the test data that you have chosen then remember here that all of the annex a controls will apply to it as it does in production. Not using ‘real data’ is the best way to meet this control and mitigate risk.

If you have to use ‘real data’ then the advice would be to have a risk register item, manage through the risk management process, even if that is accepting the risk.

How to implement ISO 27001 Annex A 8.33: Step-by-Step

In this step by step implementation checklist to ISO 27001 Test Information I show you, based on real world experience and best practice, the best way to implement Annex A 8.32.

1. Test Data Management

Challenge

Employing production data within testing environments elevates the potential for data breaches or unauthorised access.

Solution

  • Implement rigorous data sanitisation and data masking techniques.
  • Utilise synthetic data whenever possible.
  • Encrypt all production data utilised for testing purposes.
  • Establish robust access controls to safeguard test data.

2. Data Anonymisation and Data Masking

Challenge

Anonymising or masking data effectively is complex and requires constant attention to prevent re-identification risks.

Solution

  • Utilise sophisticated tools to effectively anonymise or mask sensitive data.
  • Regularly assess the effectiveness of masking techniques and ensure compliance with laws and relevant regulations.
  • Continuously monitor systems for potential vulnerabilities and weaknesses that could lead to re-identification.

3. Access Control

Challenge

Managing access rights in large organisations, especially when collaborating with external partners, can create significant security vulnerabilities.

Solution

  • Implement Role-Based Access Control (RBAC): Utilise RBAC to efficiently manage and control access permissions based on an individual’s role and responsibilities within the organisation.
  • Regularly review access rights: Conduct periodic reviews of access rights to ensure they remain appropriate and aligned with current business needs.
  • Monitor access logs: Continuously monitor access logs to detect and promptly respond to any unauthorised access attempts.

4. Environment Separation

Challenge

Maintaining distinct development, testing, and production environments can be challenging, particularly within agile development methodologies.

Solution

  • Establish and enforce strict environment separation policies: Implement Separation of Development, Test and Production Environments.
  • Leverage automation: Utilise automated tools to prevent accidental or unauthorised movement of code or data between environments.
  • Conduct regular audits: Regularly review and assess the effectiveness of environment separation controls.

5. Compliance and Security Requirements

Challenge

Maintaining compliance in test environments while adapting to constantly evolving regulations presents a significant challenge.

Solution

  • Utilise compliance management tools: Employ specialised tools to track and monitor regulatory changes and ensure compliance adherence.
  • Integrate compliance into the ISMS: Incorporate compliance requirements directly into the Information Security Management System (ISMS) framework.
  • Provide continuous training: Regularly train security teams on the latest regulatory requirements and best practices for maintaining compliance in test environments.

6. Documentation and Audit

Challenge

Maintaining comprehensive and audit-ready documentation can be time-consuming and resource-intensive.

Solution

  • Automate documentation processes: Utilise automated tools to streamline documentation tasks, such as generating reports and tracking changes.
  • Conduct regular reviews: Regularly review and update documentation to ensure accuracy, completeness, and compliance with relevant standards (e.g., ISO 27001).

Examples of using it for small businesses

Testing a new website checkout process using a copy of 100 recent customer orders. Use a tool to randomise customer names and addresses in the test copy before it’s used by the developer. Only approved IT staff can access the test server.

Examples of using it for tech startups

Developers need to test a new feature that uses real user settings and preferences. They create a synthetic dataset that perfectly simulates the structure of real data but contains no actual user-identifying information. The test environment is protected by a separate firewall.

Examples of using it for AI companies

A Machine Learning engineer needs to test a new AI model’s ability to process medical records. The engineer uses a de-identified and tokenised version of the medical records (each real patient ID is replaced by a temporary, meaningless code). This test data is stored only on an encrypted development server.

How can the ISO 27001 toolkit help?

An ISO 27001 toolkit is a great shortcut. It often includes pre-written policies, procedures, and forms that you can use right away. It saves you the hassle of writing everything from scratch and helps you make sure you don’t miss any important details.

ISO 27001 Toolkit

Information security standards that need it

This control is a key part of ISO 27001, which is an international standard for managing information security. Other standards that need it include:

  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • DORA (Digital Operational Resilience Act)
  • NIS2 (Network and Information Security (NIS) Directive) 
  • SOC 2 (Service Organisation Control 2)
  • NIST (National Institute of Standards and Technology) 
  • HIPAA (Health Insurance Portability and Accountability Act)

List of relevant ISO 27001:2022 controls

The ISO 27001:2022 standard has specific controls that relate to test data:

How to audit ISO 27001 Annex A 8.33

To conduct an internal audit of ISO 27001 Annex A 8.33 Test Information use the following audit checklist which sets out what to audit and how to audit it.

1. Test Data Management

  • Review and test data sanitisation and masking techniques.
  • Check the use of synthetic data.
  • Evidence that encryption of all production data utilised for testing purposes is in place.
  • Walkthrough the access controls that are in place to safeguard test data.

2. Data Anonymisation and Data Masking

  • Document the tools to effectively anonymise or mask sensitive data.
  • Assess the effectiveness of masking techniques and ensure compliance with relevant regulations.
  • Walkthrough systems for potential vulnerabilities and weaknesses that could lead to re-identification.

3. Access Control

  • Ensure Role-Based Access Control (RBAC) is used to manage and control access permissions based on an individual’s role and responsibilities within the organisation.
  • Review access rights: Conduct a review of access rights to ensure they remain appropriate and aligned with documented business needs.
  • Check access logs

4. Environment Separation

  • Review the environment separation policies and check for clear rules and procedures for managing and accessing each environment.
  • Assess automation and the use of automated tools to prevent accidental or unauthorised movement of code or data between environments.
  • Check there have been regular audits that review and assess the effectiveness of environment separation controls.

5. Compliance and Security Requirements

  • Review compliance management tools and how they track and monitor regulatory changes and ensure compliance adherence.
  • Ensure that compliance is integrated into the ISMS
  • Asses continuous training and that regular training is in place for security teams on the latest regulatory requirements and best practices for maintaining compliance in test environments.

6. Documentation and Audit

  • Ensure that reviews and internal audits are in place and evidenced
  • Assess the documentation framework, inputs and outputs.

ISO 27001 Annex A 8.33: Test Information FAQ

What is the purpose of ISO 27001 Annex A 8.33: Test Information?

To ensure the appropriate selection, protection, and management of test information, minimising the risk of data breaches and maintaining the confidentiality, integrity, and availability of sensitive data during testing activities.

Why is protecting test information important?

Data Breaches: Test environments often contain sensitive production data, making them a target for attackers.
Compliance: Improper handling of test data can lead to non-compliance with data privacy regulations (e.g., GDPR).
Reputational Damage: A data breach involving test data can severely damage an organisation’s reputation and erode customer trust.

What types of information are considered “test information”?

Production data used in test environments (e.g., customer data, financial information).
Test scripts and data sets.
System logs and audit trails generated during testing.

What are the key principles for protecting test information?

Data Minimisation: Only use the necessary amount of production data for testing purposes.
Data Masking and Anonymization: Employ techniques to mask or anonymise sensitive data before using it in test environments.
Access Control: Implement strong access controls to restrict access to test data and environments.
Data Encryption: Encrypt sensitive data both in transit and at rest.
Secure Data Disposal: Securely delete or destroy test data after testing is complete.

How can organisations ensure the confidentiality of test information?

Implementing strong access controls, including least privilege and multi-factor authentication.
Utilising secure communication channels for data transfer.
Encrypting data both in transit and at rest.

How can organisations ensure the integrity of test information?

Implementing data validation and integrity checks.
Using checksums and hash functions to verify data integrity.
Regularly backing up and restoring test data.

What are the key considerations for data masking and anonymization?

Selecting appropriate masking techniques based on the sensitivity of the data.
Ensuring that masked data is still suitable for testing purposes.
Regularly reviewing and updating masking rules.

How can organisations demonstrate compliance with ISO 27001 Annex A 8.33?

Documenting and implementing policies and procedures for handling test information.
Conducting regular security audits and assessments of test environments.
Monitoring and logging access to test data and environments.
Maintaining records of all data masking and anonymization activities.

What are the potential consequences of inadequate test information security?

Data breaches and loss of sensitive information.
Non-compliance with data privacy regulations.
Reputational damage and loss of customer trust.
Financial penalties and legal action.

How can organisations improve their test information security practices?

Regularly review and update security policies and procedures.
Conduct security awareness training for employees involved in testing activities.
Stay informed about emerging threats and best practices in data security.
Continuously monitor and improve security controls related to test information.

What’s the difference between “live” and “test” data?

Live data is the real information your business uses every day. Test data is a copy or simulation of that data used only for checking new features or fixes.

Can I use live customer data for testing?

Generally, no. It’s strongly discouraged and only acceptable if you have very strict security measures and documented, justified reasons (and legal permission).

What is data masking? 

It’s replacing real data fields (like names and social security numbers) with fictional but structurally valid data so developers can test without seeing actual confidential information.

Do I need a separate firewall for the test environment?

Yes, it is best practice to keep the network access to your test environment completely separate and highly restricted from your live systems.

Who is responsible for securing test data?

Ultimately, your organisation’s management is responsible, but the development and IT operations teams will handle the day-to-day work.

Does A 8.33 cover external vendors (contractors)?

Yes, if a contractor accesses your test environment, you must ensure they follow the exact same security rules you do.

What if my test data is completely fake (synthetic)?

That’s the safest option! You still need to protect the system it’s on, but the data itself poses less risk.

How long can I keep test data?

Only as long as the testing project requires it. When the project is over, you should securely delete or destroy the data.

Do system logs count as ‘test information’? 

Yes, if those logs contain personal or sensitive information that was captured during testing.

Is a staging environment a ‘test environment’?

Yes, any environment that is not your final, live production system should be treated as a test or non-production environment and needs protection.

Can a developer take test data home?

No, absolutely not. All test data should remain on approved, secured, and monitored company systems.

How do I securely wipe test data? 

You should use industry recognised secure deletion methods to overwrite the data multiple times, making it unrecoverable.

What is ‘tokenisation’ for AI companies?

It’s a masking technique where a real identifier (like a patient ID) is replaced with a random string of characters (a ‘token’) that can’t be reversed back to the original ID.

What do auditors look for with A 8.33? 

They’ll look for your written procedure, proof of data masking, and evidence of access control (who can log in and when).

If my test environment fails a security scan, what happens?

You must treat it as a serious security incident and immediately fix the vulnerability, even if it’s “just” the test system

ISO 27002:2022 Control 8.33

ISO 27002 Control 8.33 provides implementation guidance for ISO 27001 Test Information.

ISO 27001 Annex A 8.33 Attributes Table

Control typeInformation
security properties
Cybersecurity
concepts
Operational
capabilities
Security domains
PreventiveConfidentialityProtectInformation ProtectionProtection
Integrity

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.