TOMs under Art. 32 GDPR: 14 audit-proof measures for SMEs

Practitioner note: This article is practice-oriented compliance documentation, not legal advice. We are a compliance specialist, not a law firm. For legally binding information, consult a licensed attorney.

TL;DR

  • TOMs under Art. 32 GDPR are mandatory for every controller — proportionate to risk
  • No minimum list — state of the art (BSI Grundschutz, ISO 27002, ENISA)
  • 14 typical TOMs for a 30-person mechanical engineering company as an example
  • ISO 27001 covers 80-90 %, gaps in employee data protection + pseudonymisation
  • Supervisory authorities review TOMs primarily after data breaches — documenting them in advance is mandatory

1. What are TOMs?

Technical and Organisational Measures (TOM) under Art. 32 GDPR are security measures to protect personal data. They cover technical means (encryption, MFA, backup) and organisational procedures (access rights, training, four-eyes principle).

In the GDPR Kit you will find a TOM concept with 14 standard measures + ISO 27001 mapping + annual review template — one-off EUR 490-1,490.

2. Risk-based: what 'appropriate' means

Art. 32(1) lists 4 criteria for appropriateness:

3. 14 typical TOMs for SMEs

Short answer: Fourteen TOM measures form the practical standard for SMEs: MFA for admin accounts, VPN for remote access, full-disk encryption, daily backup following the 3-2-1 principle, need-to-know access concept, annual training, patch management with a 30-day deadline for Critical, four-eyes principle, server room access control, TLS 1.3, pseudonymisation in test environments, DIN 66399 document destruction, annual penetration test and an incident response plan with a semi-annual tabletop exercise.

#TOMProtection objectiveStandard solution
1MFA for all admin accountsConfidentialityFIDO2 / TOTP
2VPN for remote accessConfidentiality, integrityWireGuard / OpenVPN
3Full-disk encryptionConfidentialityBitLocker, FileVault
4Daily backupAvailability3-2-1 principle, 30-day retention
5Need-to-know access conceptConfidentiality, purpose limitationRBAC + annual review
6Annual trainingOrganisation40-slide e-learning + quiz
7Patch managementIntegrity, availability30-day deadline for Critical, 90 for High
8Four-eyes principleIntegrityFor subcontracting, payouts, data export
9Server room accessConfidentialityLocked cabinet/room + access log
10SSL/TLS for web servicesConfidentiality, integrityTLS 1.3, BSI TR-02102
11Pseudonymisation in test environmentData minimisationFaker tools, hash-based
12Document destructionConfidentialityDIN 66399 (P-4 or higher)
13Penetration testEffectivenessAnnual, sample-based
14Incident response plan + tabletopResilienceSemi-annual exercise

4. ISO 27001 mapping

Short answer: GDPR TOMs map directly onto ISO 27001 Annex A controls: access control corresponds to A.9, encryption to A.10, physical security to A.11, backup to A.12.3, training to A.7.2.2, incident management to A.16 and supplier management to A.15. Organisations certified to ISO 27001 thereby already cover most Art. 32 requirements.

TOM areaISO 27001 Annex A
Access controlA.9 (Access Control)
EncryptionA.10 (Cryptography)
Physical securityA.11 (Physical Security)
BackupA.12.3
TrainingA.7.2.2
IncidentsA.16
SuppliersA.15

5. Review cycle + supervisory practice

Supervisory authorities review TOMs primarily in two situations:

  1. After a reported data breach (Art. 33): were the TOMs appropriate?
  2. During a DPIA consultation (Art. 36): are the TOMs sufficient for the high risk?

Practical standard: annual review + ad hoc after incidents + after material IT changes.

6. Adjusting TOMs after an incident

After every data breach, TOMs MUST be reviewed. Documenting the adjustment is audit-relevant. Frequent adjustments 2024-2026:

Sources