Test information

Updated: 2026-02-17

Plain English Translation

Organizations must carefully select, protect, and manage the data used during software testing. Using sensitive production data in test environments introduces significant security risks because test systems often have looser access controls. To comply with ISO 27001 test data requirements, organizations should prioritize synthetic data or apply data masking techniques to obscure real information, strictly control who can access test environments, and permanently delete test data when it is no longer needed.

Executive Takeaway

Properly managing test information prevents the accidental exposure of sensitive production data in lower-security testing environments.

ImpactHigh
ComplexityMedium

Why This Matters

  • Reduces the risk of data breaches caused by unauthorized access to development or quality assurance environments.
  • Ensures compliance with privacy regulations like GDPR by avoiding the unnecessary processing of real personal data for testing purposes.

What “Good” Looks Like

  • Test environments use purely synthetic data or thoroughly anonymized datasets that cannot be reverse-engineered.
  • Access to test data is strictly controlled, and data is systematically purged after testing cycles are completed; tools like WatchDog Security's Policy Management can help document the retention and secure deletion procedure and track required acknowledgements for staff who access test environments.

ISO 27001:2022 control A.8.33 is a technological control requiring organizations to appropriately select, protect, and manage test information. The ISO 27001 A.8.33 test information control ensures that testing activities do not accidentally expose sensitive production data to unauthorized individuals or insecure environments.

If you are wondering should you use production data in test environments, the answer is generally no. Test environments typically have weaker access controls, broader developer access, and less rigorous monitoring than production systems. Using live data there drastically increases the risk of a data breach.

Creating compliant data involves understanding test data anonymization vs masking differences. Masking obscures specific fields, anonymization irreversibly removes identifiable information, and synthetic data uses algorithms to generate artificial data that mimics production structures without containing any real data.

To understand how to protect test data in non-production environments, organizations commonly use data masking techniques such as character substitution, shuffling, tokenization, and nulling out sensitive fields. These ensure the structure remains intact for testing while protecting the underlying sensitive information.

Test environment access control requirements ISO 27001 dictate that access should be granted strictly on the principle of least privilege. Only authorized developers and QA personnel should have access to test databases, and their activities should be logged to prevent misuse of the test environments.

Organizations must establish a secure deletion of test data procedure. Test data should only be retained for the duration of the testing cycle. Once the testing is complete, the environment and its associated data should be securely wiped to prevent the accumulation of stale, unprotected data. Tools like WatchDog Security's Policy Management can help formalize retention and deletion rules, assign owners, and track reviews so the procedure stays current.

Audit evidence for ISO 27001 test information control typically includes a Data Management Policy, a Secure Development Policy, and documented procedures demonstrating how production data is prevented from entering test environments. Auditors may also request screenshots showing automated data masking scripts in action. Tools like WatchDog Security's Compliance Center can help centralize these artifacts, link them to A.8.33, and maintain an audit-ready evidence trail over time.

Control A.8.33 specifically focuses on managing the data used during testing. It relies heavily on A.8.11 to provide the technical masking capabilities that sanitize the data, and A.8.31 to ensure that the test environments themselves are logically separated from the live production infrastructure.

While strongly discouraged, if an organization must use real PII to create GDPR compliant test data for QA testing, rigorous safeguards are mandatory. The data must be heavily anonymized or pseudonymized, and the test environment must strictly enforce production-level security controls and access restrictions.

A robust test data management policy template should define the approved methods for generating synthetic data or masking production data, outline the approval workflow for refreshing test databases, specify access control limitations, and detail the mandatory secure deletion processes post-testing.

A common gap is having the right practices but weak evidence (e.g., scattered scripts and ad-hoc approvals). Tools like WatchDog Security's Compliance Center can map A.8.33 requirements to your test-data procedure, attach masking/synthetic-data run logs as evidence, and surface gaps when controls or artifacts are missing.

Sharing test datasets often creates uncontrolled copies and unclear access trails, especially across vendors. WatchDog Security's Secure File Sharing can help distribute approved masked or synthetic datasets with time-bound access, strong verification, and auditable download logs to support least-privilege and accountability.

ISO-27001 A.8.33

"Test information shall be appropriately selected, protected and managed."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication