Skip to content

ISO 27001 A.5.20 Addressing Information Security Within Supplier Agreements Checklist

A.5.20 Addressing Information Security Within Supplier Agreements is a crucial control under the ISO/IEC 27001:2022 standard. This control mandates that organisations ensure their suppliers adhere to stringent information security policies and controls to safeguard sensitive information throughout the supply chain.

Given the increasing complexity of supply chains and the evolving nature of cybersecurity threats, effectively implementing this control is essential for maintaining robust information security.

The primary objective of A.5.20 is to ensure that information security requirements are explicitly defined, effectively communicated, and rigorously enforced within supplier agreements. This not only protects the organisation’s information assets but also ensures that suppliers maintain high standards of information security.



ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.



Why Should You Comply With Annex A.5.20? Key Aspects and Common Challenges

1. Supplier Selection and Evaluation

Risk Assessment

  • Objective: Identify and evaluate potential risks associated with suppliers.
  • Challenges: Accurately assessing risks, especially for suppliers with complex operations.

  • Solutions: Develop a comprehensive risk assessment framework that includes both qualitative and quantitative methods. Use third-party risk assessment tools for additional insights.
  • ISMS.online Features: Utilise the Risk Management module with Dynamic Risk Map and Risk Monitoring.
  • Compliance Checklist:

Conduct a comprehensive risk assessment for each supplier.

Document identified risks and mitigation strategies.

Review and update risk assessments periodically.

Criteria for Selection

  • Objective: Establish and apply criteria for selecting suppliers based on their information security capabilities.
  • Challenges: Ensuring criteria are comprehensive and aligned with security policies.

  • Solutions: Develop a standardised supplier evaluation checklist that aligns with the organisation’s security policies and requirements.
  • ISMS.online Features: Use the Supplier Management module to maintain supplier assessments and performance metrics.
  • Compliance Checklist:

Define and document criteria for supplier selection.

Evaluate suppliers based on the defined criteria.

Maintain records of supplier evaluations.

2. Contractual Obligations

Information Security Clauses

  • Objective: Include specific information security responsibilities in supplier contracts.
  • Challenges: Ensuring all contracts are updated and include relevant security clauses.

  • Solutions: Regularly review and update contract templates to include the latest security requirements. Use legal expertise to ensure enforceability.
  • ISMS.online Features: Use the Policy Management module with Policy Templates and Policy Pack.
  • Compliance Checklist:

Draft standard information security clauses for supplier contracts.

Include these clauses in all new supplier contracts.

Update existing contracts to incorporate information security clauses.

Compliance Requirements

  • Objective: Ensure suppliers comply with relevant laws, regulations, and standards.
  • Challenges: Keeping up with changing regulations and ensuring supplier compliance.

  • Solutions: Implement a regulatory monitoring system to stay updated on changes. Provide training sessions for suppliers on new compliance requirements.
  • ISMS.online Features: Utilise the Compliance Management module with Regs Database and Alert System.
  • Compliance Checklist:

Identify relevant laws, regulations, and standards for each supplier.

Communicate compliance requirements to suppliers.

Monitor supplier compliance with these requirements.

Right to Audit

  • Objective: Include audit rights in supplier contracts to ensure compliance with security measures.
  • Challenges: Gaining agreement from suppliers on audit rights and scheduling audits.

  • Solutions: Negotiate audit clauses at the beginning of the relationship. Schedule audits in advance and provide clear guidelines on the audit process.
  • ISMS.online Features: Use the Audit Management module to plan, execute, and document audits.
  • Compliance Checklist:

Include audit rights in supplier contracts.

Schedule regular audits of suppliers.

Document audit findings and follow-up actions.

3. Communication and Coordination

Information Exchange

  • Objective: Define secure methods for exchanging information between the organisation and suppliers.
  • Challenges: Ensuring secure communication channels and consistent protocols.

  • Solutions: Implement encryption and secure communication tools. Regularly update and test communication protocols.
  • ISMS.online Features: Utilise Communication tools such as Notification System and Collaboration Tools.
  • Compliance Checklist:

Establish secure communication channels with suppliers.

Define and document information exchange protocols.

Train relevant personnel on secure communication practices.

Incident Management

  • Objective: Establish procedures for reporting and managing information security incidents involving suppliers.
  • Challenges: Ensuring timely incident reporting and effective management coordination.

  • Solutions: Develop a detailed incident response plan that includes supplier coordination. Conduct regular incident response drills.
  • ISMS.online Features: Implement the Incident Management module with Incident Tracker and Workflow.
  • Compliance Checklist:

Define incident reporting and management procedures.

Communicate these procedures to suppliers.

Ensure timely reporting and coordination of incident management.



ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.



4. Monitoring and Review

Regular Reviews

  • Objective: Conduct regular reviews and assessments of supplier compliance with information security requirements.
  • Challenges: Consistently conducting thorough reviews and managing resources for continuous monitoring.

  • Solutions: Establish a review schedule and use automated tools to streamline the review process. Allocate sufficient resources for regular monitoring.
  • ISMS.online Features: Use the Supplier Management module to schedule and track performance reviews.
  • Compliance Checklist:

Schedule regular compliance reviews for suppliers.

Document the outcomes of each review.

Implement follow-up actions based on review findings.

Performance Metrics

  • Objective: Implement performance metrics to monitor supplier adherence to contractual obligations.
  • Challenges: Defining appropriate metrics and ensuring accurate data collection.

  • Solutions: Develop key performance indicators (KPIs) that align with contractual obligations. Use data analytics to monitor and report on supplier performance.
  • ISMS.online Features: The Performance Tracking module with KPI Tracking and Trend Analysis.
  • Compliance Checklist:

Define performance metrics for supplier compliance.

Collect and analyse performance data regularly.

Use performance data to drive improvements in supplier management.

5. Training and Awareness

Supplier Training

  • Objective: Ensure suppliers receive adequate training on the organisation’s information security policies and procedures.
  • Challenges: Ensuring training is effective and reaches all relevant supplier personnel.

  • Solutions: Develop comprehensive training programmes tailored to supplier needs. Use e-learning platforms to facilitate training and track progress.
  • ISMS.online Features: Use the Training module with Training Modules and Training Tracking.
  • Compliance Checklist:

Develop training materials on information security policies.

Deliver training to supplier personnel.

Track training attendance and completion.

6. Termination of Agreement

Data Return and Deletion

  • Objective: Define procedures for the secure return or deletion of the organisation’s information upon termination of the supplier agreement.
  • Challenges: Ensuring complete and secure data return or deletion.

  • Solutions: Develop clear data return and deletion procedures and include them in the contract. Use verification processes to ensure compliance.
  • ISMS.online Features: The Document Management module with Version Control and Document Retention.
  • Compliance Checklist:

Define procedures for data return and deletion.

Communicate these procedures to suppliers.

Verify and document the secure return or deletion of data.

Exit Strategy

  • Objective: Develop an exit strategy to manage the transition of services to a new supplier or back in-house, maintaining information security throughout.
  • Challenges: Managing transitions smoothly without compromising information security.

  • Solutions: Create a detailed exit strategy that includes roles and responsibilities, timelines, and security measures. Conduct transition drills to test the strategy.
  • ISMS.online Features: Use the Business Continuity module with Continuity Plans.
  • Compliance Checklist:

Develop a comprehensive exit strategy.

Communicate the exit strategy to relevant stakeholders.

Implement the exit strategy and monitor its effectiveness.

Protect Your Organisation

By leveraging the comprehensive features of ISMS.online and addressing these common challenges, organisations can ensure robust compliance with A.5.20. This involves effectively managing information security within supplier agreements and safeguarding their information assets throughout the supply chain.

Implementing these practices not only ensures compliance with ISO 27001:2022 but also strengthens the overall security posture of the organisation, fostering a culture of continuous improvement and vigilance in information security management.



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.



Every Annex A Control Checklist Table

ISO 27001 Annex A.5 Control Checklist Table
ISO 27001 Control Number ISO 27001 Control Checklist
Annex A.5.1 Policies for Information Security Checklist
Annex A.5.2 Information Security Roles and Responsibilities Checklist
Annex A.5.3 Segregation of Duties Checklist
Annex A.5.4 Management Responsibilities Checklist
Annex A.5.5 Contact With Authorities Checklist
Annex A.5.6 Contact With Special Interest Groups Checklist
Annex A.5.7 Threat Intelligence Checklist
Annex A.5.8 Information Security in Project Management Checklist
Annex A.5.9 Inventory of Information and Other Associated Assets Checklist
Annex A.5.10 Acceptable Use of Information and Other Associated Assets Checklist
Annex A.5.11 Return of Assets Checklist
Annex A.5.12 Classification of Information Checklist
Annex A.5.13 Labelling of Information Checklist
Annex A.5.14 Information Transfer Checklist
Annex A.5.15 Access Control Checklist
Annex A.5.16 Identity Management Checklist
Annex A.5.17 Authentication Information Checklist
Annex A.5.18 Access Rights Checklist
Annex A.5.19 Information Security in Supplier Relationships Checklist
Annex A.5.20 Addressing Information Security Within Supplier Agreements Checklist
Annex A.5.21 Managing Information Security in the ICT Supply Chain Checklist
Annex A.5.22 Monitoring, Review and Change Management of Supplier Services Checklist
Annex A.5.23 Information Security for Use of Cloud Services Checklist
Annex A.5.24 Information Security Incident Management Planning and Preparation Checklist
Annex A.5.25 Assessment and Decision on Information Security Events Checklist
Annex A.5.26 Response to Information Security Incidents Checklist
Annex A.5.27 Learning From Information Security Incidents Checklist
Annex A.5.28 Collection of Evidence Checklist
Annex A.5.29 Information Security During Disruption Checklist
Annex A.5.30 ICT Readiness for Business Continuity Checklist
Annex A.5.31 Legal, Statutory, Regulatory and Contractual Requirements Checklist
Annex A.5.32 Intellectual Property Rights Checklist
Annex A.5.33 Protection of Records Checklist
Annex A.5.34 Privacy and Protection of PII Checklist
Annex A.5.35 Independent Review of Information Security Checklist
Annex A.5.36 Compliance With Policies, Rules, and Standards for Information Security Checklist
Annex A.5.37 Documented Operating Procedures Checklist
ISO 27001 Annex A.8 Control Checklist Table
ISO 27001 Control Number ISO 27001 Control Checklist
Annex A.8.1 User Endpoint Devices Checklist
Annex A.8.2 Privileged Access Rights Checklist
Annex A.8.3 Information Access Restriction Checklist
Annex A.8.4 Access to Source Code Checklist
Annex A.8.5 Secure Authentication Checklist
Annex A.8.6 Capacity Management Checklist
Annex A.8.7 Protection Against Malware Checklist
Annex A.8.8 Management of Technical Vulnerabilities Checklist
Annex A.8.9 Configuration Management Checklist
Annex A.8.10 Information Deletion Checklist
Annex A.8.11 Data Masking Checklist
Annex A.8.12 Data Leakage Prevention Checklist
Annex A.8.13 Information Backup Checklist
Annex A.8.14 Redundancy of Information Processing Facilities Checklist
Annex A.8.15 Logging Checklist
Annex A.8.16 Monitoring Activities Checklist
Annex A.8.17 Clock Synchronisation Checklist
Annex A.8.18 Use of Privileged Utility Programs Checklist
Annex A.8.19 Installation of Software on Operational Systems Checklist
Annex A.8.20 Networks Security Checklist
Annex A.8.21 Security of Network Services Checklist
Annex A.8.22 Segregation of Networks Checklist
Annex A.8.23 Web Filtering Checklist
Annex A.8.24 Use of Cryptography Checklist
Annex A.8.25 Secure Development Life Cycle Checklist
Annex A.8.26 Application Security Requirements Checklist
Annex A.8.27 Secure System Architecture and Engineering Principles Checklist
Annex A.8.28 Secure Coding Checklist
Annex A.8.29 Security Testing in Development and Acceptance Checklist
Annex A.8.30 Outsourced Development Checklist
Annex A.8.31 Separation of Development, Test and Production Environments Checklist
Annex A.8.32 Change Management Checklist
Annex A.8.33 Test Information Checklist
Annex A.8.34 Protection of Information Systems During Audit Testing Checklist

How ISMS.online Help With A.5.20

Ready to enhance your organisation’s information security and ensure compliance with ISO 27001:2022?

Discover how ISMS.online can streamline your compliance efforts, manage supplier relationships, and protect your valuable information assets. Our comprehensive platform offers all the tools and features you need to effectively implement A.5.20 and other critical controls.

Contact us now to schedule a personalised demo and see how ISMS.online can transform your information security management. Our experts are here to guide you through every step, ensuring you get the most out of our solutions.


David Holloway

Chief Marketing Officer

David Holloway is the Chief Marketing Officer at ISMS.online, with over four years of experience in compliance and information security. As part of the leadership team, David focuses on empowering organisations to navigate complex regulatory landscapes with confidence, driving strategies that align business goals with impactful solutions. He is also the co-host of the Phishing For Trouble podcast, where he delves into high-profile cybersecurity incidents and shares valuable lessons to help businesses strengthen their security and compliance practices.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.