Skip to main content
โ† All controls
PM-25 / A.8.11 / CIS-3.12 NIST SP 800-53 Rev 5

No production PII in non-prod

Demonstrate that non-production environments contain no production PII and that technical controls prevent unauthorized copying of production data to development, test, or staging systems.

Description

What this control does

This control prohibits the use of production personally identifiable information (PII) in non-production environments including development, testing, staging, and sandbox systems. Organizations must implement technical and procedural safeguards to ensure that test data is either synthetically generated, anonymized, or de-identified to a standard that removes re-identification risk. This prevents exposure of sensitive customer data to broader technical teams, reduces the attack surface for data breaches, and ensures compliance with data protection regulations that restrict secondary use of personal data.

Control objective

What auditing this proves

Demonstrate that non-production environments contain no production PII and that technical controls prevent unauthorized copying of production data to development, test, or staging systems.

Associated risks

Risks this control addresses

  • Unauthorized access to production PII by developers, testers, or contractors with access to non-production systems lacking equivalent access controls
  • Data breach through compromise of less-secured non-production environments exposing real customer personal information
  • Regulatory non-compliance with GDPR, CCPA, HIPAA, or other privacy laws restricting purpose limitation and data minimization
  • Inadvertent disclosure of PII through non-production system logs, error messages, or debugging outputs shared externally
  • Insider threat exploitation where malicious employees extract production PII from inadequately monitored test environments
  • Accidental data loss or corruption when non-production environments are destroyed or reset without proper data lifecycle management
  • Reputational damage and loss of customer trust following discovery that personal data was mishandled in testing activities

Testing procedure

How an auditor verifies this control

  1. Obtain and review the organization's data classification policy and non-production environment usage policy documenting PII handling requirements.
  2. Inventory all non-production environments including development, QA, staging, sandboxes, and contractor/vendor test systems with database access.
  3. Select a representative sample of non-production databases and data stores across different application tiers and business units.
  4. Execute database queries or data profiling tools against sampled non-production systems to identify fields matching PII patterns (names, emails, SSNs, phone numbers, addresses).
  5. Review data masking, tokenization, or synthetic data generation tooling configurations to verify coverage of all PII fields identified in production schemas.
  6. Examine access logs and data movement records for the past 90 days to identify any production data exports, snapshots, or replication jobs targeting non-production systems.
  7. Interview development and QA teams to verify awareness of the policy and confirm procedures for obtaining test data that comply with the control.
  8. Test technical preventive controls such as database firewall rules, data loss prevention (DLP) policies, or automated scanning tools that block production PII from non-production environments.
Evidence required Database query results or data profiling reports showing field-level analysis of non-production data with no matches to production PII patterns. Data masking tool configuration exports, synthetic data generation scripts, or anonymization workflow documentation. Access logs, data transfer audit trails, or DLP policy enforcement logs covering production-to-non-production data movement for the review period. Screenshots of technical controls preventing unauthorized data copying and interview notes confirming team awareness.
Pass criteria No production PII is present in sampled non-production environments, technical controls prevent unauthorized data copying from production systems, and all data movement logs show only masked or synthetic data transfers to non-production systems during the review period.

Where this control is tested

Audit programs including this control