- See ISO 27002:2022 Control 5.20 for more information.
- See ISO 27001:2013 Annex A 15.1.2 for more information.
What Is The Purpose of ISO 27001:2022 Annex A 5.20?
ISO 27001 Annex A Control 5.20 governs how an organisation forms a contract with a supplier based on their requirements for security. This is based on the types of suppliers they work with.
As part of Annex A Control 5.20, organisations and their suppliers must agree upon mutually acceptable information security obligations to maintain risk.
Who Has Ownership of Annex A 5.20?
Annex Control 5.20 should be determined by whether the organisation operates its own legal department, as well as the nature of the agreement that has been signed.
Managing any changes to supply chain policies, procedures, and controls, including maintaining and improving existing information security policies, procedures, and controls, is considered effective control.
This is determined by considering the criticality of business information, the nature of the change, the type/s of suppliers affected, the systems and processes involved, and reassessing risk factors. Changing the services a supplier provides should also consider the relationship’s intimacy and the organisation’s ability to influence or control the change.
Ownership of 5.20 should rest with the individual responsible for legally binding agreements within the organisation (contracts, memos of understanding, service level agreements, etc.) if the organisation has the legal capacity to draft, amend, and store its contract agreements without the involvement of third parties.
A member of senior management in the organisation who oversees the commercial operations of the organisation and maintains direct relationships with its suppliers should take responsibility for Annex A Control 5.20 if the organisation outsources such agreements.
Get an 81% headstart
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
ISO 27001:2022 Annex A 5.20 General Guidance
Control 5.20 of Annex A contains 25 guidance points that ISO states are “possible to consider” (i.e. not necessarily all) for organisations to meet their information security requirements.
Annex A Control 5.20 specifies that regardless of measures adopted, both parties must emerge from the process with a “clear understanding” of each other’s information security obligations.
- It is essential to provide a clear description of the information that needs to be accessed and how that information will be accessed.
- Organisations should classify information by their published classification schemes (see Annex A Controls 5.10, 5.12, and 5.13).
- Information classification on the supplier’s side should be considered along with how it relates to that on the organisation’s side.
- Generally, both parties’ rights can be divided into four categories: legal, statutory, regulatory, and contractual. As is standard with commercial agreements, various obligations should be clearly outlined within these four areas, including access to personal information, intellectual property rights, and copyright provisions. The contract should also cover how these key areas will be addressed separately.
- As part of the Annex A control system, each party should be required to implement concurrent measures designed to monitor, assess, and manage information security risks (such as access control policies, contractual reviews, monitoring, reporting, and periodic auditing). Furthermore, the agreement should clearly state that supplier personnel must comply with the organisation’s information security standards (see ISO 27001 Annex A Control 5.20).
- Both parties must clearly understand what constitutes acceptable and unacceptable use of information, as well as physical and virtual assets.
- To ensure that supplier-side personnel can access and view an organisation’s information, procedures should be put in place (e.g. supplier-side audits and server access controls).
- In addition to considering the supplier’s ICT infrastructure, it is important to understand how that relates to the type of information the organisation will access. This is in addition to the organisation’s core set of business requirements.
- If the supplier breaches the contract or fails to comply with individual terms, the organisation should consider what steps it can take.
- Specifically, the agreement should describe a mutual incident management procedure that clarifies how problems should be handled when they arise. This includes how both parties should communicate when an incident occurs.
- Both parties should provide adequate awareness training (where standard training is not sufficient) in key areas of the agreement, particularly in areas of risk such as Incident Management and Information Sharing.
- The use of subcontractors should be adequately addressed. Organisations should ensure that, if the supplier is allowed to utilise subcontractors, any such individuals or companies adhere to the same information security standards as the supplier.
- As far as it is legally and operationally possible, organisations should consider how supplier personnel are screened before interacting with their information. In addition, they should consider how screenings are recorded and reported to the organisation, including nonscreened personnel and areas of concern.
- Third-party attestation, such as independent reports and third-party audits, should be required by organisations for suppliers that comply with their information security requirements.
- ISO 27001:2022 Annex A Control 5.20 requires that organisations have the right to evaluate and audit their suppliers’ procedures.
- A supplier should be required to provide periodic reports (at varying intervals) that summarise the effectiveness of their processes and procedures and how they intend to address any issues raised.
- During the relationship, the agreement should include measures to ensure that any defects or conflicts are timely and thoroughly resolved.
- An appropriate BUDR policy should be implemented by the supplier, tailored to meet the organisation’s needs, that addresses three key considerations: a) Backup type (full server, file and folder, incremental), b) Backup frequency (daily, weekly, etc.) C) Backup location and source media (onsite, offsite).
- It is essential to ensure data resilience by operating out of a disaster recovery facility separate from the supplier’s main ICT site. This facility is not subject to the same level of risk as the main ICT site.
- Suppliers should maintain a comprehensive change management policy that allows the organisation to reject any changes that might affect information security in advance.
- Physical security controls should be implemented depending on what information they are permitted to access (building access, visitor access, room access, desk security).
- Whenever data is transferred between assets, sites, servers, or storage locations, suppliers should ensure that the data and assets are protected against loss, damage, or corruption.
- As part of the agreement, each party should be required to take an extensive list of actions in the event of termination (see Annex A Control 5.20). These actions include (but are not limited to): a) disposing of assets and/or relocation, b) deleting information, c) returning IP, d) removing access rights e) continuing confidentiality obligations.
- In addition to point 23, the supplier should discuss in detail how it intends to destroy/permanently delete the organisation’s information when it is no longer needed (i.e. upon the termination of the contract).
- Whenever a contract ends and the need arises to transfer support and/or services to another provider not listed on the contract, steps are taken to ensure no interruption to business operations.
Accompanying Annex A Controls
- ISO 27001:2022 Annex A 5.10
- ISO 27001:2022 Annex A 5.12
- ISO 27001:2022 Annex A 5.13
- ISO 27001:2022 Annex A 5.20
Compliance doesn't have to be complicated.
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
Supplementary Guidance on Annex A 5.20
Annex A Control 5.20 recommends that organisations maintain a register of agreements to assist them in managing their supplier relationships.
Records of all agreements held with other organisations should be kept, categorised by the nature of the relationship. This includes contracts, memoranda of understanding, and agreements relating to information sharing.
What Are the Changes From ISO 27001:2013?
An amendment to ISO 27001:2013 Annex A 15.1.2 (Addressing security within supplier agreements) has been made to ISO 27001:2022 Annex A Control 5.20.
Several additional guidelines are contained in Annex A Control 5.20 of ISO 27001:2022 that address a broad range of technical, legal, and compliance-related issues, including:
- The handover procedure.
- Destruction of information.
- Provisions for termination.
- Controls for physical security.
- Change management.
- Information redundancy and backups.
As a general rule, ISO 27001:2022 Annex A 5.20 emphasises how a supplier achieves redundancy and data integrity throughout a contract.
Table of All ISO 27001:2022 Annex A Controls
In the table below you’ll find more information on each individual ISO 27001:2022 Annex A Control.
ISO 27001:2022 Organisational Controls
Annex A Control Type | ISO/IEC 27001:2022 Annex A Identifier | ISO/IEC 27001:2013 Annex A Identifier | Annex A Name |
---|---|---|---|
Organisational Controls | Annex A 5.1 | Annex A 5.1.1 Annex A 5.1.2 | Policies for Information Security |
Organisational Controls | Annex A 5.2 | Annex A 6.1.1 | Information Security Roles and Responsibilities |
Organisational Controls | Annex A 5.3 | Annex A 6.1.2 | Segregation of Duties |
Organisational Controls | Annex A 5.4 | Annex A 7.2.1 | Management Responsibilities |
Organisational Controls | Annex A 5.5 | Annex A 6.1.3 | Contact With Authorities |
Organisational Controls | Annex A 5.6 | Annex A 6.1.4 | Contact With Special Interest Groups |
Organisational Controls | Annex A 5.7 | NEW | Threat Intelligence |
Organisational Controls | Annex A 5.8 | Annex A 6.1.5 Annex A 14.1.1 | Information Security in Project Management |
Organisational Controls | Annex A 5.9 | Annex A 8.1.1 Annex A 8.1.2 | Inventory of Information and Other Associated Assets |
Organisational Controls | Annex A 5.10 | Annex A 8.1.3 Annex A 8.2.3 | Acceptable Use of Information and Other Associated Assets |
Organisational Controls | Annex A 5.11 | Annex A 8.1.4 | Return of Assets |
Organisational Controls | Annex A 5.12 | Annex A 8.2.1 | Classification of Information |
Organisational Controls | Annex A 5.13 | Annex A 8.2.2 | Labelling of Information |
Organisational Controls | Annex A 5.14 | Annex A 13.2.1 Annex A 13.2.2 Annex A 13.2.3 | Information Transfer |
Organisational Controls | Annex A 5.15 | Annex A 9.1.1 Annex A 9.1.2 | Access Control |
Organisational Controls | Annex A 5.16 | Annex A 9.2.1 | Identity Management |
Organisational Controls | Annex A 5.17 | Annex A 9.2.4 Annex A 9.3.1 Annex A 9.4.3 | Authentication Information |
Organisational Controls | Annex A 5.18 | Annex A 9.2.2 Annex A 9.2.5 Annex A 9.2.6 | Access Rights |
Organisational Controls | Annex A 5.19 | Annex A 15.1.1 | Information Security in Supplier Relationships |
Organisational Controls | Annex A 5.20 | Annex A 15.1.2 | Addressing Information Security Within Supplier Agreements |
Organisational Controls | Annex A 5.21 | Annex A 15.1.3 | Managing Information Security in the ICT Supply Chain |
Organisational Controls | Annex A 5.22 | Annex A 15.2.1 Annex A 15.2.2 | Monitoring, Review and Change Management of Supplier Services |
Organisational Controls | Annex A 5.23 | NEW | Information Security for Use of Cloud Services |
Organisational Controls | Annex A 5.24 | Annex A 16.1.1 | Information Security Incident Management Planning and Preparation |
Organisational Controls | Annex A 5.25 | Annex A 16.1.4 | Assessment and Decision on Information Security Events |
Organisational Controls | Annex A 5.26 | Annex A 16.1.5 | Response to Information Security Incidents |
Organisational Controls | Annex A 5.27 | Annex A 16.1.6 | Learning From Information Security Incidents |
Organisational Controls | Annex A 5.28 | Annex A 16.1.7 | Collection of Evidence |
Organisational Controls | Annex A 5.29 | Annex A 17.1.1 Annex A 17.1.2 Annex A 17.1.3 | Information Security During Disruption |
Organisational Controls | Annex A 5.30 | NEW | ICT Readiness for Business Continuity |
Organisational Controls | Annex A 5.31 | Annex A 18.1.1 Annex A 18.1.5 | Legal, Statutory, Regulatory and Contractual Requirements |
Organisational Controls | Annex A 5.32 | Annex A 18.1.2 | Intellectual Property Rights |
Organisational Controls | Annex A 5.33 | Annex A 18.1.3 | Protection of Records |
Organisational Controls | Annex A 5.34 | Annex A 18.1.4 | Privacy and Protection of PII |
Organisational Controls | Annex A 5.35 | Annex A 18.2.1 | Independent Review of Information Security |
Organisational Controls | Annex A 5.36 | Annex A 18.2.2 Annex A 18.2.3 | Compliance With Policies, Rules and Standards for Information Security |
Organisational Controls | Annex A 5.37 | Annex A 12.1.1 | Documented Operating Procedures |
ISO 27001:2022 People Controls
Annex A Control Type | ISO/IEC 27001:2022 Annex A Identifier | ISO/IEC 27001:2013 Annex A Identifier | Annex A Name |
---|---|---|---|
People Controls | Annex A 6.1 | Annex A 7.1.1 | Screening |
People Controls | Annex A 6.2 | Annex A 7.1.2 | Terms and Conditions of Employment |
People Controls | Annex A 6.3 | Annex A 7.2.2 | Information Security Awareness, Education and Training |
People Controls | Annex A 6.4 | Annex A 7.2.3 | Disciplinary Process |
People Controls | Annex A 6.5 | Annex A 7.3.1 | Responsibilities After Termination or Change of Employment |
People Controls | Annex A 6.6 | Annex A 13.2.4 | Confidentiality or Non-Disclosure Agreements |
People Controls | Annex A 6.7 | Annex A 6.2.2 | Remote Working |
People Controls | Annex A 6.8 | Annex A 16.1.2 Annex A 16.1.3 | Information Security Event Reporting |
ISO 27001:2022 Physical Controls
Annex A Control Type | ISO/IEC 27001:2022 Annex A Identifier | ISO/IEC 27001:2013 Annex A Identifier | Annex A Name |
---|---|---|---|
Physical Controls | Annex A 7.1 | Annex A 11.1.1 | Physical Security Perimeters |
Physical Controls | Annex A 7.2 | Annex A 11.1.2 Annex A 11.1.6 | Physical Entry |
Physical Controls | Annex A 7.3 | Annex A 11.1.3 | Securing Offices, Rooms and Facilities |
Physical Controls | Annex A 7.4 | NEW | Physical Security Monitoring |
Physical Controls | Annex A 7.5 | Annex A 11.1.4 | Protecting Against Physical and Environmental Threats |
Physical Controls | Annex A 7.6 | Annex A 11.1.5 | Working In Secure Areas |
Physical Controls | Annex A 7.7 | Annex A 11.2.9 | Clear Desk and Clear Screen |
Physical Controls | Annex A 7.8 | Annex A 11.2.1 | Equipment Siting and Protection |
Physical Controls | Annex A 7.9 | Annex A 11.2.6 | Security of Assets Off-Premises |
Physical Controls | Annex A 7.10 | Annex A 8.3.1 Annex A 8.3.2 Annex A 8.3.3 Annex A 11.2.5 | Storage Media |
Physical Controls | Annex A 7.11 | Annex A 11.2.2 | Supporting Utilities |
Physical Controls | Annex A 7.12 | Annex A 11.2.3 | Cabling Security |
Physical Controls | Annex A 7.13 | Annex A 11.2.4 | Equipment Maintenance |
Physical Controls | Annex A 7.14 | Annex A 11.2.7 | Secure Disposal or Re-Use of Equipment |
ISO 27001:2022 Technological Controls
Annex A Control Type | ISO/IEC 27001:2022 Annex A Identifier | ISO/IEC 27001:2013 Annex A Identifier | Annex A Name |
---|---|---|---|
Technological Controls | Annex A 8.1 | Annex A 6.2.1 Annex A 11.2.8 | User Endpoint Devices |
Technological Controls | Annex A 8.2 | Annex A 9.2.3 | Privileged Access Rights |
Technological Controls | Annex A 8.3 | Annex A 9.4.1 | Information Access Restriction |
Technological Controls | Annex A 8.4 | Annex A 9.4.5 | Access to Source Code |
Technological Controls | Annex A 8.5 | Annex A 9.4.2 | Secure Authentication |
Technological Controls | Annex A 8.6 | Annex A 12.1.3 | Capacity Management |
Technological Controls | Annex A 8.7 | Annex A 12.2.1 | Protection Against Malware |
Technological Controls | Annex A 8.8 | Annex A 12.6.1 Annex A 18.2.3 | Management of Technical Vulnerabilities |
Technological Controls | Annex A 8.9 | NEW | Configuration Management |
Technological Controls | Annex A 8.10 | NEW | Information Deletion |
Technological Controls | Annex A 8.11 | NEW | Data Masking |
Technological Controls | Annex A 8.12 | NEW | Data Leakage Prevention |
Technological Controls | Annex A 8.13 | Annex A 12.3.1 | Information Backup |
Technological Controls | Annex A 8.14 | Annex A 17.2.1 | Redundancy of Information Processing Facilities |
Technological Controls | Annex A 8.15 | Annex A 12.4.1 Annex A 12.4.2 Annex A 12.4.3 | Logging |
Technological Controls | Annex A 8.16 | NEW | Monitoring Activities |
Technological Controls | Annex A 8.17 | Annex A 12.4.4 | Clock Synchronization |
Technological Controls | Annex A 8.18 | Annex A 9.4.4 | Use of Privileged Utility Programs |
Technological Controls | Annex A 8.19 | Annex A 12.5.1 Annex A 12.6.2 | Installation of Software on Operational Systems |
Technological Controls | Annex A 8.20 | Annex A 13.1.1 | Networks Security |
Technological Controls | Annex A 8.21 | Annex A 13.1.2 | Security of Network Services |
Technological Controls | Annex A 8.22 | Annex A 13.1.3 | Segregation of Networks |
Technological Controls | Annex A 8.23 | NEW | Web filtering |
Technological Controls | Annex A 8.24 | Annex A 10.1.1 Annex A 10.1.2 | Use of Cryptography |
Technological Controls | Annex A 8.25 | Annex A 14.2.1 | Secure Development Life Cycle |
Technological Controls | Annex A 8.26 | Annex A 14.1.2 Annex A 14.1.3 | Application Security Requirements |
Technological Controls | Annex A 8.27 | Annex A 14.2.5 | Secure System Architecture and Engineering Principles |
Technological Controls | Annex A 8.28 | NEW | Secure Coding |
Technological Controls | Annex A 8.29 | Annex A 14.2.8 Annex A 14.2.9 | Security Testing in Development and Acceptance |
Technological Controls | Annex A 8.30 | Annex A 14.2.7 | Outsourced Development |
Technological Controls | Annex A 8.31 | Annex A 12.1.4 Annex A 14.2.6 | Separation of Development, Test and Production Environments |
Technological Controls | Annex A 8.32 | Annex A 12.1.2 Annex A 14.2.2 Annex A 14.2.3 Annex A 14.2.4 | Change Management |
Technological Controls | Annex A 8.33 | Annex A 14.3.1 | Test Information |
Technological Controls | Annex A 8.34 | Annex A 12.7.1 | Protection of Information Systems During Audit Testing |
What Are the Benefits of Using ISMS.online for Supplier Relationships?
A step-by-step checklist guides you through the entire ISO 27001 implementation process, from defining the scope of your ISMS to identifying risks and implementing controls.
Through ISMS.online’s easy-to-use Accounts relationships (e.g. supplier) area, you can ensure that your relationships are carefully selected, managed well in life and monitored and reviewed. ISMS.online’s collaborative project work spaces have easily met this control objective. These work spaces are useful for supplier on boarding, joint initiatives, off boarding, etc., which the auditor can also view easily when necessary.
We have also made this control objective easier for your organisation by enabling you to demonstrate that the supplier has formally committed to complying with the requirements. This is done through our Policy Packs. These policy packs are especially useful for organisations with specific policies and controls that they wish their suppliers to adhere to so that they can have confidence that their suppliers have read these policies and have committed to complying with them.
It may be necessary to align the change with A.6.1.5 Information security in project management depending on the nature of the change (e.g. for more substantial changes).