ISO 27001 A.5.29 Information Security During Disruption Checklist

Ensuring information security during disruptions is a critical aspect of the ISO 27001:2022 standard. Disruptions can range from natural disasters and cyber-attacks to equipment failures and other unforeseen events. The goal of control A.5.29 is to maintain the integrity, confidentiality, and availability of information even when normal operations are compromised.

This involves comprehensive planning, risk assessment, incident response, communication, testing, and documentation to ensure that all aspects of information security are covered during a disruption.

Scope of Annex A.5.29

Business Continuity Planning:

Develop and implement a business continuity plan (BCP) that includes procedures for maintaining information security during disruptions. Identify critical business functions and ensure they are protected during incidents.

Risk Assessment:

Conduct thorough risk assessments to identify potential disruptions and their impact on information security. Assess the likelihood and impact of each scenario to prioritise mitigation efforts.

Mitigation Strategies:

Implement effective mitigation strategies to protect information assets. This includes backup systems, redundant infrastructure, and alternative communication channels.

Incident Response:

Establish an incident response plan to manage information security during disruptions. Train staff to respond effectively to incidents that could compromise information security.

Communication:

Develop a robust communication plan to ensure all stakeholders are informed during a disruption. This includes internal and external communication to maintain transparency and coordination.

Testing and Review:

Regularly test and review business continuity and incident response plans to ensure their effectiveness. Conduct drills and simulations to identify areas for improvement.

Documentation:

Maintain comprehensive documentation of all procedures, plans, and protocols related to information security during disruptions. Ensure this documentation is accessible during disruptions.


Get an 81% headstart

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

Why Should You Comply With Annex A.5.29? Key Aspects and Common Challenges

Business Continuity Planning:

Development and Implementation:

Challenges: Aligning business continuity plans with the organisation’s objectives and ensuring all critical functions are identified.

Solutions: Use ISMS.online’s Continuity Plans and Doc Templates for structured planning and comprehensive documentation.

Related ISO Clauses: Context of the organisation, Planning of changes.

Critical Functions Identification:

Challenges: Accurately identifying and prioritising critical functions can be complex.

Solutions: Leverage the Risk Bank and Dynamic Risk Map to identify and prioritise critical functions based on risk assessments.

Related ISO Clauses: Understanding the needs and expectations of interested parties, Determining the scope of the ISMS.

Risk Assessment:

Risk Identification:

Challenges: Identifying all potential disruptions and their impacts can be daunting.

Solutions: Utilise ISMS.online’s Risk Bank to capture a wide range of potential risks.

Related ISO Clauses: Information security risk assessment process, Information security risk treatment.

Likelihood and Impact Assessment:

Challenges: Accurately assessing the likelihood and impact of disruption scenarios.

Solutions: Use the Dynamic Risk Map for visual representation and prioritisation of risks.

Related ISO Clauses: Risk assessment and risk treatment plan, Risk treatment implementation.

Mitigation Strategies:

Implementation:

Challenges: Ensuring that mitigation strategies are practical and effective.

Solutions: Use ISMS.online’s Risk Monitoring to continuously evaluate and adjust mitigation strategies.

Related ISO Clauses: Actions to address risks and opportunities, Information security objectives and planning to achieve them.

Backup Systems and Redundancy:

Challenges: Implementing and maintaining effective backup and redundancy systems.

Solutions: Incorporate redundancy plans within ISMS.online’s Continuity Plans feature for robust backup strategies.

Related ISO Clauses: Planning of changes, Control of documented information.

Incident Response:

Plan Establishment:

Challenges: Developing a comprehensive incident response plan that covers all possible scenarios.

Solutions: Use ISMS.online’s Incident Tracker and Workflow to ensure thorough and structured incident response planning.

Related ISO Clauses: Incident management, Planning of changes.

Training:

Challenges: Ensuring all staff are adequately trained to respond to incidents.

Solutions: Utilise the Training Modules in ISMS.online to deliver and track incident response training.

Related ISO Clauses: Competence, Training and awareness.

Communication:

Plan Development:

Challenges: Creating an effective communication plan that reaches all stakeholders.

Solutions: Leverage ISMS.online’s Alert System and Notification System for timely and efficient communication.

Related ISO Clauses: Internal and external communication, Planning of changes.

Stakeholder Coordination:

Challenges: Ensuring all relevant stakeholders are informed and coordinated during disruptions.

Solutions: Use the Collaboration Tools in ISMS.online to facilitate seamless communication and coordination.

Related ISO Clauses: Communication, Internal communication.

Testing and Review:

Regular Testing:

Challenges: Scheduling and conducting regular tests and reviews of the continuity and incident response plans.

Solutions: Utilise ISMS.online’s Test Schedules and Reporting tools to manage and document testing activities.

Related ISO Clauses: Monitoring, measurement, analysis and evaluation, Internal audit.

Continuous Improvement:

Challenges: Identifying and implementing improvements based on test results.

Solutions: Conduct post-incident reviews using ISMS.online’s Incident Tracker and Reporting features to capture lessons learned and track improvements.

Related ISO Clauses: Improvement, Nonconformity and corrective action.

Documentation:

Comprehensive Documentation:

Challenges: Ensuring all relevant procedures, plans, and protocols are well-documented and accessible.

Solutions: Use ISMS.online’s Doc Templates and Version Control for maintaining up-to-date and comprehensive documentation.

Related ISO Clauses: Documented information, Control of documented information.

Accessibility:

Challenges: Making sure documentation is accessible during disruptions.

Solutions: Store critical documents in ISMS.online’s Documentation feature, ensuring they are accessible even during disruptions.

Related ISO Clauses: Control of documented information, Availability of information.


Compliance doesn't have to be complicated.

We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.

Book a demo

ISMS.online Features for Demonstrating Compliance with A.5.29

  • Risk Management:

    • Risk Bank: Central repository for identifying and assessing risks related to potential disruptions.
    • Dynamic Risk Map: Visual representation of risks and their impact, helping to prioritise mitigation strategies.
    • Risk Monitoring: Continuous monitoring and updating of risks to ensure proactive management.
  • Incident Management:

    • Incident Tracker: Logging and tracking incidents to ensure they are managed effectively.
    • Workflow: Automated workflows to guide the incident response process, ensuring all steps are followed.
    • Notifications: Real-time alerts and notifications to keep all stakeholders informed during an incident.
    • Reporting: Comprehensive reports on incident handling and outcomes to support continuous improvement.
  • Business Continuity:

    • Continuity Plans: Templates and tools for developing and maintaining business continuity plans.
    • Test Schedules: Scheduling and tracking of tests and drills to ensure plans are effective.
    • Reporting: Documentation and reporting tools to demonstrate the effectiveness of continuity measures.
  • Communication:

    • Alert System: Tools for rapidly communicating with stakeholders during a disruption.
    • Notification System: Automated notifications to ensure timely information dissemination.
    • Collaboration Tools: Platforms for seamless communication and collaboration among team members during disruptions.
  • Documentation:

    • Doc Templates: Predefined templates for documenting plans, procedures, and protocols.
    • Version Control: Ensuring that all documentation is up-to-date and changes are tracked.
    • Collaboration: Tools to enable multiple users to contribute to and update documentation.

Detailed Annex A.5.29 Compliance Checklist

Business Continuity Planning:

Develop and document a comprehensive business continuity plan (BCP) using ISMS.online’s Continuity Plans.

Identify and prioritise critical business functions and processes with the Risk Bank and Dynamic Risk Map.

Ensure the BCP aligns with organisational objectives and is accessible during disruptions.

Risk Assessment:

Conduct a thorough risk assessment to identify potential disruptions using the Risk Bank.

Assess the likelihood and impact of disruption scenarios with the Dynamic Risk Map.

Mitigation Strategies:

Implement practical and effective mitigation strategies, leveraging ISMS.online’s Risk Monitoring.

Develop and maintain robust backup systems and redundancy plans within the Continuity Plans feature.

Incident Response:

Establish a comprehensive incident response plan using the Incident Tracker and Workflow.

Train staff on incident response procedures using Training Modules and track training completion.

Communication:

Develop an effective communication plan for disruptions using the Alert System and Notification System.

Ensure seamless communication and coordination among stakeholders with Collaboration Tools.

Testing and Review:

Schedule and conduct regular tests and reviews of continuity and incident response plans using Test Schedules.

Capture lessons learned and track improvements with Incident Tracker and Reporting features.

Documentation:

Document all relevant procedures, plans, and protocols using Doc Templates.

Maintain up-to-date documentation with Version Control and ensure accessibility during disruptions with ISMS.online’s Documentation feature.

By adhering to A.5.29 and utilising ISMS.online’s comprehensive features, organisations can ensure that their information security measures remain effective and resilient, even in the face of significant operational challenges. This control is vital for minimising the impact of disruptions and for maintaining the trust of stakeholders in the organisation’s ability to protect sensitive information.


Manage all your compliance in one place

ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.

Book a demo

Every Annex A Control Checklist Table

ISO 27001 Annex A.5 Control Checklist Table

ISO 27001 Control NumberISO 27001 Control Checklist
Annex A.5.1Policies for Information Security Checklist
Annex A.5.2Information Security Roles and Responsibilities Checklist
Annex A.5.3Segregation of Duties Checklist
Annex A.5.4Management Responsibilities Checklist
Annex A.5.5Contact With Authorities Checklist
Annex A.5.6Contact With Special Interest Groups Checklist
Annex A.5.7Threat Intelligence Checklist
Annex A.5.8Information Security in Project Management Checklist
Annex A.5.9Inventory of Information and Other Associated Assets Checklist
Annex A.5.10Acceptable Use of Information and Other Associated Assets Checklist
Annex A.5.11Return of Assets Checklist
Annex A.5.12Classification of Information Checklist
Annex A.5.13Labelling of Information Checklist
Annex A.5.14Information Transfer Checklist
Annex A.5.15Access Control Checklist
Annex A.5.16Identity Management Checklist
Annex A.5.17Authentication Information Checklist
Annex A.5.18Access Rights Checklist
Annex A.5.19Information Security in Supplier Relationships Checklist
Annex A.5.20Addressing Information Security Within Supplier Agreements Checklist
Annex A.5.21Managing Information Security in the ICT Supply Chain Checklist
Annex A.5.22Monitoring, Review and Change Management of Supplier Services Checklist
Annex A.5.23Information Security for Use of Cloud Services Checklist
Annex A.5.24Information Security Incident Management Planning and Preparation Checklist
Annex A.5.25Assessment and Decision on Information Security Events Checklist
Annex A.5.26Response to Information Security Incidents Checklist
Annex A.5.27Learning From Information Security Incidents Checklist
Annex A.5.28Collection of Evidence Checklist
Annex A.5.29Information Security During Disruption Checklist
Annex A.5.30ICT Readiness for Business Continuity Checklist
Annex A.5.31Legal, Statutory, Regulatory and Contractual Requirements Checklist
Annex A.5.32Intellectual Property Rights Checklist
Annex A.5.33Protection of Records Checklist
Annex A.5.34Privacy and Protection of PII Checklist
Annex A.5.35Independent Review of Information Security Checklist
Annex A.5.36Compliance With Policies, Rules, and Standards for Information Security Checklist
Annex A.5.37Documented Operating Procedures Checklist


ISO 27001 Annex A.6 Control Checklist Table

ISO 27001 Control NumberISO 27001 Control Checklist
Annex A.6.1Screening Checklist
Annex A.6.2Terms and Conditions of Employment Checklist
Annex A.6.3Information Security Awareness, Education and Training Checklist
Annex A.6.4Disciplinary Process Checklist
Annex A.6.5Responsibilities After Termination or Change of Employment Checklist
Annex A.6.6Confidentiality or Non-Disclosure Agreements Checklist
Annex A.6.7Remote Working Checklist
Annex A.6.8Information Security Event Reporting Checklist


ISO 27001 Annex A.7 Control Checklist Table

ISO 27001 Control NumberISO 27001 Control Checklist
Annex A.7.1Physical Security Perimeters Checklist
Annex A.7.2Physical Entry Checklist
Annex A.7.3Securing Offices, Rooms, and Facilities Checklist
Annex A.7.4Physical Security Monitoring Checklist
Annex A.7.5Protecting Against Physical and Environmental Threats Checklist
Annex A.7.6Working in Secure Areas Checklist
Annex A.7.7Clear Desk and Clear Screen Checklist
Annex A.7.8Equipment Siting and Protection Checklist
Annex A.7.9Security of Assets Off-Premises Checklist
Annex A.7.10Storage Media Checklist
Annex A.7.11Supporting Utilities Checklist
Annex A.7.12Cabling Security Checklist
Annex A.7.13Equipment Maintenance Checklist
Annex A.7.14Secure Disposal or Re-Use of Equipment Checklist


ISO 27001 Annex A.8 Control Checklist Table

ISO 27001 Control NumberISO 27001 Control Checklist
Annex A.8.1User Endpoint Devices Checklist
Annex A.8.2Privileged Access Rights Checklist
Annex A.8.3Information Access Restriction Checklist
Annex A.8.4Access to Source Code Checklist
Annex A.8.5Secure Authentication Checklist
Annex A.8.6Capacity Management Checklist
Annex A.8.7Protection Against Malware Checklist
Annex A.8.8Management of Technical Vulnerabilities Checklist
Annex A.8.9Configuration Management Checklist
Annex A.8.10Information Deletion Checklist
Annex A.8.11Data Masking Checklist
Annex A.8.12Data Leakage Prevention Checklist
Annex A.8.13Information Backup Checklist
Annex A.8.14Redundancy of Information Processing Facilities Checklist
Annex A.8.15Logging Checklist
Annex A.8.16Monitoring Activities Checklist
Annex A.8.17Clock Synchronisation Checklist
Annex A.8.18Use of Privileged Utility Programs Checklist
Annex A.8.19Installation of Software on Operational Systems Checklist
Annex A.8.20Networks Security Checklist
Annex A.8.21Security of Network Services Checklist
Annex A.8.22Segregation of Networks Checklist
Annex A.8.23Web Filtering Checklist
Annex A.8.24Use of Cryptography Checklist
Annex A.8.25Secure Development Life Cycle Checklist
Annex A.8.26Application Security Requirements Checklist
Annex A.8.27Secure System Architecture and Engineering Principles Checklist
Annex A.8.28Secure Coding Checklist
Annex A.8.29Security Testing in Development and Acceptance Checklist
Annex A.8.30Outsourced Development Checklist
Annex A.8.31Separation of Development, Test and Production Environments Checklist
Annex A.8.32Change Management Checklist
Annex A.8.33Test Information Checklist
Annex A.8.34Protection of Information Systems During Audit Testing Checklist


How ISMS.online Help With A.5.29

To see how ISMS.online can help your organisation achieve compliance with A.5.29 and other ISO 27001:2022 controls, we invite you to contact us and book a demo.

Experience firsthand how our platform can streamline your information security management and enhance your resilience against disruptions.

Book your demo today and take the first step towards robust information security management!


Jump to topic

Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

ISMS Platform Tour

Interested in an ISMS.online platform tour?

Start your free 2-minute interactive demo now and experience the magic of ISMS.online in action!

Try it for free

We’re a Leader in our Field

Users Love Us
Leader Winter 2025
Leader Winter 2025 United Kingdom
Best ROI Winter 2025
Fastest Implementation Winter 2025
Most Implementable Winter 2025

"ISMS.Online, Outstanding tool for Regulatory Compliance"

-Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

-Karen C.

"Innovative solution to managing ISO and other accreditations"

-Ben H.

Streamline your workflow with our new Jira integration! Learn more here.