Skip to main content
← All controls
A.8.11 / A.8.12 / SC-12.4 ISO/IEC 27001:2022 Annex A

Synthetic / anonymised data preferred where viable

Demonstrate that the organisation systematically identifies opportunities to replace production sensitive data with synthetic or anonymised alternatives, implements technical controls to enforce this preference, and validates that non-production environments do not contain unmasked sensitive data unless a justified exception exists.

Description

What this control does

This control mandates the preferential use of synthetic, anonymised, or pseudonymised datasets in place of production data containing sensitive or personally identifiable information, particularly in non-production environments such as development, testing, staging, and analytics. Synthetic data is artificially generated to mimic the statistical properties and structure of real data without exposing actual individuals or confidential business information. Anonymisation irreversibly removes or transforms identifiers so that individuals cannot be re-identified, while pseudonymisation replaces identifiers with artificial tokens. By reducing exposure of genuine sensitive data, organisations minimise the risk of breaches, insider threats, and regulatory violations while maintaining operational and testing fidelity.

Control objective

What auditing this proves

Demonstrate that the organisation systematically identifies opportunities to replace production sensitive data with synthetic or anonymised alternatives, implements technical controls to enforce this preference, and validates that non-production environments do not contain unmasked sensitive data unless a justified exception exists.

Associated risks

Risks this control addresses

  • Unauthorised access to production data copied into less-secure non-production environments leads to data exfiltration or breach
  • Developers or testers with excessive access to real customer data use it for unauthorised purposes or inadvertently disclose it
  • Third-party vendors or contractors gain access to genuine sensitive data through testing or analytics environments
  • Ransomware or malware infections in development environments expose production datasets that were copied for testing
  • Regulatory penalties arise from processing real personal data without lawful basis in testing, development, or analytics workflows
  • Data leakage through inadequate disposal or poor handling of test datasets containing real sensitive information
  • Re-identification attacks succeed when anonymisation techniques are insufficient or reversible, compromising privacy assurances

Testing procedure

How an auditor verifies this control

  1. Review the organisation's data classification and handling policy to identify requirements and guidance on the use of synthetic or anonymised data in non-production contexts.
  2. Obtain an inventory of all non-production environments (development, test, staging, QA, analytics, training) and the datasets used within each.
  3. Select a representative sample of non-production environments and examine database schemas, file stores, and data pipelines to determine if synthetic, anonymised, or production data is in use.
  4. Interview data owners, developers, and data engineers to understand data provisioning workflows and criteria for deciding whether to use synthetic data versus production data.
  5. Review technical documentation and configuration of data anonymisation or synthetic data generation tools, including libraries, scripts, or commercial platforms deployed.
  6. Examine access control logs and data lineage records to confirm that sensitive production data is not copied directly to non-production environments without transformation.
  7. Test a sample of anonymised or synthetic datasets to verify that re-identification is not feasible and that data utility for testing or analytics purposes is preserved.
  8. Review exception requests and approvals for cases where production data is used in non-production environments, confirming documented business justification, compensating controls, and time-bound access.
Evidence required Artefacts include the data handling and classification policy with clauses on synthetic data preference, inventory of non-production environments and associated datasets, configuration exports or source code of anonymisation tools and synthetic data generators, access control logs showing restricted data provisioning workflows, sample outputs from anonymisation processes with validation reports, exception request forms with risk assessments and management approvals, and email or meeting minutes demonstrating governance oversight of production data use in non-production contexts.
Pass criteria The control passes if the organisation maintains a documented policy favouring synthetic or anonymised data in non-production environments, enforces this through technical provisioning controls, demonstrates no unauthorised use of unmasked production sensitive data in sampled non-production environments, and maintains justified, approved exceptions with compensating controls where production data is required.

Where this control is tested

Audit programs including this control