Sub-contracted PII processing

You must flow down equivalent privacy and security controls to any sub-contractor that processes PII on your behalf, and you must do it contractually. Practically, that means: identify sub-processors, assess their ability to meet your required controls, bind them to those controls in written terms, and monitor compliance over time.

Key takeaways:

  • You are accountable for PII protection across the processing chain; sub-contracting does not reduce your obligations.
  • “Equivalent controls” must be written into sub-contractor contracts, not left to informal assurances.
  • Operationalize this with a sub-processor inventory, standard contract clauses, and recurring oversight evidence.

“Sub-contracted PII processing” is a simple requirement with a lot of operational surface area. ISO/IEC 27018 targets public cloud providers acting as PII processors, but the control maps cleanly to any environment where your service relies on third parties to store, access, transmit, or support systems containing customer PII. If a sub-contractor touches PII, you need contractual terms that require the same class of controls you committed to in your own customer agreements and privacy program.

This page focuses on doing the work fast and defensibly: how to determine who counts as a sub-contractor for PII processing, how to define “equivalent controls” in a way procurement and legal can execute, and what evidence auditors will ask for. The goal is not perfect paperwork; it’s a working chain-of-custody for PII obligations, from your customer contract down to each sub-processor agreement, with monitoring that proves the control isn’t a one-time checkbox.

If you use a platform like Daydream to centralize third-party due diligence, contract artifacts, and renewal workflows, this requirement becomes much easier to scale because you can standardize evidence collection and contract flowdowns across every sub-processor relationship.

Regulatory text

Requirement (verbatim): “Where the public cloud PII processor engages a sub-contractor for PII processing, equivalent controls shall be contractually required of the sub-contractor.” 1

What the operator must do

  1. Detect sub-contracted PII processing (any third party you engage that processes PII in delivering your cloud service).
  2. Define the baseline control set you owe to your customers (privacy + security requirements for PII processing).
  3. Flow down that baseline into every relevant sub-contractor agreement as binding contractual obligations.
  4. Retain evidence showing the flowdown exists and is maintained as relationships change.

Plain-English interpretation

If your cloud service processes PII and you hire another third party to help deliver that service (hosting, support, analytics, customer communication tooling, managed services, sub-processors), you must require that third party to follow controls that are equivalent to yours. “Equivalent” does not mean identical word-for-word; it means the sub-contractor’s obligations must achieve the same protections for PII that you promise upstream.

This is a contract requirement first, then a governance requirement. Auditors will look for (a) a complete list of sub-processors, (b) contracts that impose PII protection duties on each, and (c) proof you review and maintain those contracts over time.

Who it applies to

Entity scope

  • Public cloud PII processors (cloud service providers acting as processors of customer PII) per ISO/IEC 27018. 1

Operational scope (what “engages a sub-contractor for PII processing” includes)

Treat a third party as in-scope if it does any of the following for systems containing customer PII:

  • Stores or hosts PII (IaaS/PaaS hosting, managed databases, backup providers)
  • Accesses PII (support tooling, outsourced support desks, managed security providers with log access)
  • Transmits PII (email/SMS providers, ETL tools, CDPs)
  • Alters PII (enrichment, deduplication, identity verification)
  • Can reasonably access PII as part of administration (SRE outsourcing, managed Kubernetes, consultancy with admin credentials)

A common hangup: “They don’t process PII; they just provide software.” If the software provider receives PII (or has access to it in operation/support), treat it as processing for this control.

What you actually need to do (step-by-step)

Step 1: Build and maintain a sub-processor inventory (PII chain map)

Create one authoritative register for:

  • Sub-contractor legal name and service description
  • Whether they process PII (yes/no/unknown)
  • PII categories involved (customer contact data, identifiers, HR data, end-user data, etc.)
  • Access mode (stored, transient, support access, admin access)
  • System/process they support
  • Contract status (signed, pending, renewal date)
  • Evidence pointer (where the signed DPA/terms live)

Operator tip: If engineering can add a dependency without procurement seeing it, you will miss sub-processors. Add an intake gate in vendor onboarding: “Will this third party store or access PII?” with a forced justification.

Step 2: Define “equivalent controls” as a contract-ready baseline

Write a short control baseline you can attach to templates and DPAs. Keep it testable. At minimum, define obligations covering:

  • Confidentiality and authorized processing: process PII only on documented instructions
  • Security controls: appropriate technical and organizational measures, access control, encryption expectations where relevant to your service
  • Sub-subcontracting restrictions: require permission/notice before they engage their own sub-processors for your PII
  • Incident notification: notification obligations and cooperation duties
  • Audit/assurance: right to receive assurance artifacts (such as independent audit reports) or to audit under defined conditions
  • Return/deletion: PII deletion or return at termination, with timelines aligned to your customer commitments
  • Geography and transfers: if you make location commitments to customers, flow them down
  • Confidentiality of personnel: workforce confidentiality and training expectations

Keep “equivalent” anchored to your upstream commitments. If your customer contracts promise specific security/privacy behaviors, those are the minimum to flow down.

Step 3: Update contracting process to enforce flowdown

Implement a contracting rule: no PII access without signed terms containing the baseline.

Practical mechanics:

  • Update procurement playbooks: PII processing triggers mandatory privacy/security addendum.
  • Standardize templates: master services agreement + data processing addendum (or equivalent exhibit) + security schedule.
  • Add redline rules: create a list of non-negotiables (for example, restrictions on secondary use of PII; incident notice; deletion/return).
  • Route exceptions: define an approval workflow for any deviation from baseline control language (privacy + security + CCO sign-off).

Where Daydream fits: Daydream can centralize the sub-processor register, attach the required contract clauses per third party risk tier, and track renewal and exception approvals so you can prove the flowdown stays current without spreadsheet sprawl.

Step 4: Validate the sub-contractor can meet the obligations (not just sign them)

ISO/IEC 27018 A.11.11 is contract-focused, but auditors will expect you to show you didn’t flow down impossible obligations.

Do a right-sized due diligence check before signature:

  • Security questionnaire aligned to your baseline controls
  • Review of their security/privacy program documentation (policies, incident response overview, access control model)
  • Confirmation of how they handle sub-processing and where data is stored/processed
  • Evidence-based exceptions: if they can’t meet a clause, document compensating controls or alternative terms and get formal approval

Step 5: Ongoing oversight (renewals, changes, and sub-subcontractors)

Operationalize “contractually required” as “stays contractually required”:

  • Renewal calendar for each in-scope agreement
  • Trigger events: new product feature that shares PII with a new third party; region expansion; support model change
  • Periodic reassessment cadence based on risk (higher-risk sub-processors reviewed more often)
  • Track their sub-processor disclosures when they subcontract further, and confirm your contract requires equivalent flowdowns downstream

Required evidence and artifacts to retain

Auditors typically want proof across four questions: who, what, where-in-contract, and how-you-know.

Retain:

  • Sub-processor inventory/register with PII processing determination and service mapping
  • Signed agreements with each in-scope sub-contractor, including the privacy/security addendum or equivalent exhibit
  • Contract clause matrix mapping your baseline controls to the exact section references in the signed contract
  • Exception register: deviations from baseline, risk acceptance, approvals, compensating controls
  • Due diligence package: questionnaires, security documentation received, review notes, and final approval
  • Change management records: onboarding tickets, architecture review notes for new data flows, renewal workflow records
  • Termination evidence: deletion/return confirmations where applicable

Common exam/audit questions and hangups

Expect these, and prepare your evidence to answer them quickly:

  1. “Show me all sub-contractors that process customer PII.”
    Hangup: incomplete inventory or unclear PII determination logic.

  2. “Where in the contract are equivalent controls required?”
    Hangup: scattered terms across exhibits; missing addenda for older agreements.

  3. “How do you ensure new sub-processors can’t be onboarded without the right terms?”
    Hangup: engineering-led purchases or click-through tools outside procurement.

  4. “What happens when a sub-contractor changes its processing or adds its own sub-processors?”
    Hangup: no trigger-based review; no contractual notice/approval mechanism.

  5. “How do you handle exceptions?”
    Hangup: informal email approvals with no risk rationale.

Frequent implementation mistakes (and how to avoid them)

  • Mistake: Equating “equivalent controls” with “SOC 2 exists.”
    Fix: SOC 2 can support assurance, but you still need contract language that binds the sub-contractor to your PII requirements.

  • Mistake: Only doing this for obvious data hosts.
    Fix: Include support tooling, observability/logging providers, and outsourced admins who can access PII.

  • Mistake: Signing contracts, then forgetting renewals and scope drift.
    Fix: tie reassessments and contract reviews to renewal dates and system change triggers.

  • Mistake: Letting business owners accept risk ad hoc.
    Fix: formal exception workflow with privacy/security/CCO approvals and documented compensating controls.

  • Mistake: Contract terms that are not operationally enforceable.
    Fix: confirm the sub-contractor can meet incident notice, deletion, and access control obligations in practice before signature.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific regulator actions.

Risk implications to communicate internally:

  • PII incident amplification: a weak sub-processor becomes your incident.
  • Contractual breach upstream: if your customer agreements promise protections you fail to flow down, you risk breach of contract and loss of trust.
  • Audit failure: missing flowdown language is easy for auditors to spot and hard to defend after the fact.

Practical execution plan (30/60/90 days)

You asked for speed; here is a plan that works in real procurement environments while staying defensible.

First 30 days: Stop the bleeding and establish the baseline

  • Stand up a single sub-processor inventory and name an owner.
  • Identify your current “top risk” sub-processors (those with broad PII access, production admin access, or critical service dependency).
  • Draft the equivalent-controls baseline and update contract templates.
  • Create an intake gate for new third parties: “Will they store/access PII?” with mandatory privacy review if yes.

By 60 days: Remediate highest-risk contracts and formalize exceptions

  • Remediate contracts for top-risk sub-processors missing the baseline (amendment or updated addendum).
  • Implement an exception register and approval workflow.
  • Define minimum due diligence evidence for any in-scope sub-contractor.
  • Train procurement and business owners on the “no PII without terms” rule.

By 90 days: Operationalize monitoring and prove repeatability

  • Complete inventory coverage for all in-scope sub-processors.
  • Add renewal tracking and reassessment triggers (renewals, new features, region changes, support model changes).
  • Produce a clause mapping matrix for in-scope agreements.
  • Implement reporting for leadership: inventory completeness, open contract gaps, approved exceptions.

Frequently Asked Questions

What counts as a “sub-contractor” for sub-contracted PII processing?

Any third party you engage that processes PII to deliver your cloud service, including those that store, access, transmit, or administer systems with PII. If they can access PII during support or operations, treat them as in scope.

What does “equivalent controls” mean in practice?

Controls that deliver the same protection outcomes you commit to in your own privacy and security program. Document a baseline control schedule and require it in the sub-contractor agreement so the flowdown is explicit and auditable.

Do we need to amend every contract immediately?

Start with sub-contractors that have the broadest PII access and business criticality, then work through the rest on renewals. Track gaps in a remediation register so you can show a managed plan, not ad hoc cleanup.

Is a security questionnaire enough, or do we need contract terms?

You need the contract terms. A questionnaire helps validate capability, but ISO/IEC 27018 A.11.11 requires equivalent controls to be “contractually required.” 1

How do we handle click-through SaaS tools that might receive PII?

Put them through the same intake gate and require the correct addendum or negotiated terms before allowing production PII. If the tool can’t meet baseline clauses, document an exception with compensating controls or block the use case.

What evidence is most persuasive to auditors?

A complete sub-processor register, signed agreements with the baseline control schedule attached, and a clause mapping that shows where each obligation lives in each contract. Pair that with a clear exception log and renewal monitoring records.

Footnotes

  1. ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

Frequently Asked Questions

What counts as a “sub-contractor” for sub-contracted PII processing?

Any third party you engage that processes PII to deliver your cloud service, including those that store, access, transmit, or administer systems with PII. If they can access PII during support or operations, treat them as in scope.

What does “equivalent controls” mean in practice?

Controls that deliver the same protection outcomes you commit to in your own privacy and security program. Document a baseline control schedule and require it in the sub-contractor agreement so the flowdown is explicit and auditable.

Do we need to amend every contract immediately?

Start with sub-contractors that have the broadest PII access and business criticality, then work through the rest on renewals. Track gaps in a remediation register so you can show a managed plan, not ad hoc cleanup.

Is a security questionnaire enough, or do we need contract terms?

You need the contract terms. A questionnaire helps validate capability, but ISO/IEC 27018 A.11.11 requires equivalent controls to be “contractually required.” (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

How do we handle click-through SaaS tools that might receive PII?

Put them through the same intake gate and require the correct addendum or negotiated terms before allowing production PII. If the tool can’t meet baseline clauses, document an exception with compensating controls or block the use case.

What evidence is most persuasive to auditors?

A complete sub-processor register, signed agreements with the baseline control schedule attached, and a clause mapping that shows where each obligation lives in each contract. Pair that with a clear exception log and renewal monitoring records.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27018: Sub-contracted PII processing | Daydream