ISO 27001 vs GDPR: How They Relate

ISO 27001 and GDPR are often mentioned together, but they're very different things. This guide explains how they relate, where they overlap, and requirements.

ISO 27001 and GDPR are two of the most frequently mentioned compliance frameworks in the UK — and they’re often confused with one another, or assumed to be interchangeable. They’re not.

This guide explains what each one is, how they differ, where they overlap, and what the practical implications are for organisations that need to address both.


A Quick Summary

ISO 27001 is an international standard for building and managing an Information Security Management System (ISMS). It’s about how you manage the security of all your information assets — not just personal data. Certification is voluntary in most cases.

GDPR (the UK General Data Protection Regulation, post-Brexit) is a legal obligation. It’s a data protection law that governs how organisations collect, process, store, and share personal data about individuals. Compliance is mandatory if you process personal data.

The key difference: GDPR is law, ISO 27001 is a standard. Non-compliance with GDPR can result in regulatory fines and enforcement action. Non-compliance with ISO 27001 has no direct legal consequence — but it may cost you business.


What Is GDPR?

UK GDPR (retained EU law, now sitting alongside the Data Protection Act 2018) applies to any organisation that processes personal data about individuals in the UK or EU. It establishes:

  • Lawful bases for processing — you need a legitimate reason to process personal data (consent, legitimate interests, contract, legal obligation, vital interests, or public task)
  • Data subject rights — individuals have the right to access their data, correct it, erase it, restrict processing, and port it
  • Accountability obligations — you must be able to demonstrate compliance, including a records of processing activities (RoPA), data protection impact assessments (DPIAs), and appropriate technical/organisational measures
  • Breach notification — you must notify the ICO within 72 hours of becoming aware of a reportable personal data breach
  • Data transfers — special rules apply to transferring personal data outside the UK/EU

Enforcement is handled by the ICO (Information Commissioner’s Office), which has the power to issue fines of up to £17.5 million or 4% of global annual turnover (whichever is higher) for serious breaches.


What ISO 27001 Covers That GDPR Doesn’t

ISO 27001 is broader than GDPR in scope. It applies to all information assets, not just personal data. Your financial records, intellectual property, trade secrets, technical systems, and operational data are all in scope for ISO 27001 — regardless of whether they contain personal data.

ISO 27001 also goes into considerably more detail on:

  • Risk assessment methodology — how you systematically identify and evaluate risks
  • Security controls — the 93 Annex A controls cover technical, physical, organisational, and people-related security measures in detail
  • ISMS management — governance, management review, internal audit, continual improvement
  • Security operations — vulnerability management, incident management, access control, secure development, supplier security

GDPR doesn’t prescribe how you manage information security — it simply requires you to have “appropriate technical and organisational measures.” ISO 27001 is one of the clearest ways to evidence what “appropriate” looks like.


What GDPR Covers That ISO 27001 Doesn’t

GDPR focuses on rights and obligations that go well beyond security:

  • Lawful basis for processing — ISO 27001 doesn’t require you to justify why you hold data; GDPR does
  • Data subject rights — handling access requests, erasure requests, objections — these are GDPR obligations with no ISO 27001 equivalent
  • Privacy notices — informing individuals about how their data is used
  • Records of processing activities (RoPA) — a register of all processing activities under Article 30
  • Data Protection Officer (DPO) — certain organisations must appoint a DPO; ISO 27001 has no equivalent requirement
  • Data transfers — cross-border transfer mechanisms (adequacy decisions, standard contractual clauses) are GDPR-specific

Achieving ISO 27001 certification does not make you GDPR compliant.

ISO 27001 vs GDPR: What Each Covers

ISO 27001 vs GDPR: What Each Framework Covers

Two complementary frameworks — not competing alternatives

Nature ISO 27001 — Voluntary standard
Where they meet Security of personal data
Nature GDPR — Legal obligation
ISO 27001 only
All information assets
Intellectual property & trade secrets
Financial & operational records
Technical systems & configurations
Risk assessment methodology
93 Annex A security controls
Internal audit programme
Management review process
Statement of Applicability
Both frameworks
Security of personal data
Encryption & pseudonymisation
Confidentiality, integrity & availability
Backup & resilience
Incident response & breach management
Supplier & processor management
Access control & data minimisation
Staff training
Regular testing of security measures
GDPR only
Personal data & rights
Lawful basis for processing
Data subject rights (access, erasure, portability)
Privacy notices & fair processing
Records of Processing Activities (RoPA)
Data Protection Impact Assessments
Data Protection Officer (where required)
Cross-border transfer mechanisms
ICO breach notification (72-hour rule)
ISO 27001 at a glance
Enforced byMarket & customers
Penalty for non-complianceLost business
Verified byThird-party certification
Applies toAll organisations (voluntary)
GDPR at a glance
Enforced byICO (UK regulator)
Penalty for non-complianceUp to £17.5m or 4% turnover
Verified bySelf-assessed + ICO audit
Applies toAny processor of personal data
ISO 27001 certification does not equal GDPR compliance — but a solid ISO 27001 implementation covers most of the security obligations under GDPR Article 32, leaving a focused layer of GDPR-specific work on top.

Where They Overlap

Despite the differences, there is significant overlap between ISO 27001 and GDPR — particularly in the area of security of personal data (GDPR Article 5(1)(f) and Article 32).

Article 32 requires organisations to implement “appropriate technical and organisational measures” to ensure a level of security appropriate to the risk. The measures it suggests include:

  • Pseudonymisation and encryption of personal data
  • Ongoing confidentiality, integrity, availability, and resilience of systems
  • The ability to restore access to personal data in a timely manner after an incident
  • A process for regularly testing and evaluating security measures

These map almost directly to ISO 27001 controls:

GDPR Article 32 requirementISO 27001 equivalent
Encryption and pseudonymisationControl 8.24 (Use of cryptography)
Confidentiality, integrity, availabilityCore ISMS principles + multiple controls
Ability to restore dataControls 5.30, 8.13 (backup), 8.14 (redundancy)
Regular testing of measuresControl 5.35 (independent review), internal audit

If you’ve implemented ISO 27001 properly, you’ve addressed the security requirements of Article 32 comprehensively. This is one of the most significant practical benefits of ISO 27001 for GDPR purposes.

There’s also overlap in:

  • Incident management — GDPR breach notification requirements align with ISO 27001 incident management controls (5.24–5.28)
  • Supplier management — GDPR requires data processing agreements with processors; ISO 27001 Controls 5.19–5.22 cover supplier security management
  • Access control — GDPR’s principle of data minimisation reinforces ISO 27001’s least-privilege access controls
  • Data retention — GDPR’s storage limitation principle aligns with ISO 27001’s approach to information lifecycle
GDPR Article 32 and ISO 27001: The Overlap Mapped

GDPR Article 32 and ISO 27001: The Security Overlap Mapped

ISO 27001 controls address the security obligations in GDPR Article 32 comprehensively

GDPR Article 32 requires…
ISO 27001 equivalent
Encryption & pseudonymisation of personal data
Technical measures to protect personal data in storage and transit
Art. 32(1)(a)
Control 8.24 — Use of cryptography
Policies for encryption algorithms, key management, and use of cryptographic controls across systems
Control 8.24
Ongoing confidentiality, integrity, availability & resilience
Core security properties maintained for all systems processing personal data
Art. 32(1)(b)
Core ISMS principles + multiple controls
CIA triad underpins the entire ISMS; controls across access management, network security, and operations address each property
ISMS foundation
Ability to restore access to personal data in a timely manner
Recovery capability after an incident, failure, or attack
Art. 32(1)(c)
Controls 5.30, 8.13 & 8.14
ICT continuity planning (5.30), information backup requirements (8.13), and redundancy of information processing (8.14)
5.30 8.13 8.14
A process for regularly testing & evaluating security measures
Ongoing assurance that controls remain effective — not a one-time exercise
Art. 32(1)(d)
Control 5.35 & Internal Audit
Independent information security review (5.35) plus the ISO 27001 internal audit programme provides exactly this assurance cycle
5.35 Internal audit
🚨
Incident Management
GDPR: Notify ICO within 72 hours of a reportable personal data breach
ISO 27001: Incident detection, response, and reporting procedures
Controls 5.24–5.28
👥
Supplier Management
GDPR: Data processing agreements required with all data processors
ISO 27001: Supplier security assessment and contractual obligations
Controls 5.19–5.22
🔒
Access Control
GDPR: Data minimisation — only process what’s necessary, limit who can access it
ISO 27001: Least-privilege access controls across all systems
Controls 5.15–5.18
📅
Data Retention
GDPR: Storage limitation — don’t keep personal data longer than necessary
ISO 27001: Information classification and lifecycle management
Control 5.9 / 5.12
A properly implemented ISO 27001 ISMS addresses all four Article 32 security requirements — providing strong, auditable evidence of “appropriate technical and organisational measures” under GDPR.

The Practical Relationship: Implementing Both Together

The most efficient approach for organisations that need to address both frameworks is to implement them together, using a shared foundation of documentation and controls.

What you need for both:

  • An information security policy (ISO 27001) / Privacy policy (GDPR)
  • A risk assessment (ISO 27001) / Data protection impact assessments for high-risk processing (GDPR)
  • Incident response procedure (both)
  • Supplier management and data processing agreements (both)
  • Staff training on information security and data protection (both)
  • Access control and data minimisation (both)

What you need for ISO 27001 only:

  • Statement of Applicability
  • Full Annex A control implementation
  • Internal audit programme
  • Management review
  • ISMS scope document

What you need for GDPR only:

  • Records of processing activities (RoPA)
  • Lawful basis documentation for each processing activity
  • Privacy notices / fair processing information
  • Subject access request procedure
  • DPO appointment (if applicable)
  • Cross-border transfer mechanisms (if applicable)

Implementing ISO 27001 and GDPR Together

Implementing ISO 27001 and GDPR Together

Build on a shared foundation — then add the framework-specific layer on top

Foundation
Needed for both
Build these once — they satisfy requirements under both frameworks simultaneously
Information security policy
Risk assessment & risk register
Incident response procedure
Supplier management & data processing agreements
Staff information security training
Access control & data minimisation
ISO 27001 only
Add for certification
Required for ISO 27001 certification; no direct GDPR equivalent
+
Statement of Applicability (SoA)
+
Full Annex A control implementation (93 controls)
+
Internal audit programme
+
Management review process
+
ISMS scope document
GDPR only
Add for compliance
Legal obligations under UK GDPR with no direct ISO 27001 equivalent
+
Records of Processing Activities (RoPA)
+
Lawful basis documentation for each processing activity
+
Privacy notices & fair processing information
+
Subject access request procedure
+
Data Protection Officer (if required)
+
Cross-border transfer mechanisms (if applicable)
💡
The efficient approach: implement the shared foundation first — it’s the heaviest lift and satisfies both frameworks at once. ISO 27001 certification and GDPR-specific compliance work can then proceed in parallel on top of that foundation, with minimal duplication.
A good ISO 27001 implementation does most of the security heavy lifting for GDPR — covering Article 32 comprehensively — leaving a focused, manageable layer of GDPR-specific documentation and procedures on top.

Can ISO 27001 Help With ICO Enforcement?

Yes, indirectly. The ICO takes into account the steps an organisation has taken to implement appropriate security measures when assessing penalty levels. ISO 27001 certification is strong evidence of a systematic, risk-based approach to security — and auditors for the ICO understand what it involves.

The Capita ICO fine case is a useful reference point: the decision specifically noted security shortcomings that ISO 27001 controls would have addressed. Conversely, an organisation that is ISO 27001 certified is in a materially stronger position if it faces an ICO investigation.

ISO 27001 is not a shield — certification doesn’t guarantee you’ll never suffer a breach or face regulatory action. But it demonstrates that you took your obligations seriously, which matters when regulators are determining accountability.


Summary

AreaISO 27001GDPR
NatureVoluntary standardLegal obligation
ScopeAll information assetsPersonal data
FocusSecurity management systemRights and obligations around personal data
EnforcementNo direct regulatory enforcementICO fines up to £17.5m
CertificationThird-party certificationNo certification — self-assessed compliance
OverlapArticle 32 security requirementsSupported by ISO 27001 controls

The two frameworks are complementary, not competing. Most organisations that need to address both will find that a good ISO 27001 implementation does most of the security heavy lifting for GDPR — with a focused layer of GDPR-specific work on top.


Does ISO 27001 certification mean we’re GDPR compliant?

No — and this is one of the most common misconceptions. ISO 27001 certification means you have a structured, audited information security management system in place. It addresses the security obligations under GDPR Article 32 comprehensively, but GDPR requires additional work that falls entirely outside ISO 27001’s scope: documenting your lawful basis for processing, maintaining a Record of Processing Activities, handling data subject rights requests, and publishing privacy notices. Think of ISO 27001 as doing the security heavy lifting for GDPR — not replacing it.

If GDPR is mandatory, why would we also pursue ISO 27001?

GDPR tells you thatyou must have appropriate technical and organisational security measures in place — it doesn’t tell you how to do it. ISO 27001 gives you the structured framework to actually implement those measures, and third-party certification gives you auditable evidence that you’ve done so. That evidence matters: the ICO takes it into account when assessing penalty levels, and enterprise customers increasingly require it. GDPR compliance alone rarely satisfies a client security questionnaire; ISO 27001 certification usually does.

We’re a small UK business that doesn’t deal with the EU — does GDPR still apply to us?

Yes. UK GDPR (retained in domestic law alongside the Data Protection Act 2018) applies to any organisation processing personal data about individuals in the UK, regardless of size or whether you have EU customers. If you have employees, customers, or website visitors whose personal data you collect and process, UK GDPR applies to you. There is no small business exemption, though the practical compliance burden is lighter for organisations with lower-risk, smaller-scale processing.

Is it more efficient to implement ISO 27001 and GDPR at the same time?

Generally yes. The two frameworks share a substantial common foundation — risk assessment, incident response, supplier management, access controls, and staff training all satisfy requirements under both. Building that foundation once is significantly more efficient than treating them as separate projects. The ISO 27001-specific work (Statement of Applicability, internal audit, management review) and GDPR-specific work (RoPA, privacy notices, data subject rights procedures) can then be layered on top with relatively little duplication.

Could ISO 27001 certification help us if we face an ICO investigation?

Yes, indirectly but meaningfully. The ICO considers the steps an organisation took to implement appropriate security when determining penalty levels. ISO 27001 certification is strong, independently verified evidence of a systematic, risk-based approach to security — which is precisely what the ICO is looking for. It won’t prevent an investigation if a breach occurs, and it’s not a guarantee of immunity from fines. But an organisation that is certified is in a materially stronger position than one with no documented security framework, both in terms of the penalty level and in demonstrating it took its obligations seriously.

Look up the Capita fine from ICO (spoiler alert: £14m) and how the ICO said 27001 would have helped.

Photo of author

Written by

Alan Parker

Alan Parker is an ISO 27001 consultant who has helped dozens of UK small businesses achieve certification — often without a dedicated security team or a large budget. With over 30 years in IT governance and qualifications including ITIL v3 Expert, ITIL v4 Bridge, and PRINCE2 Practitioner, Alan writes in plain English for busy teams who need to get things done. Named IT Project Expert of the Year (2024, UK).