Skip to content

ISO 27001 A.5.5 Contact With Authorities Checklist

Control A.5.5 of ISO 27001:2022, “Contact With Authorities,” requires organisations to establish and maintain procedures for timely and appropriate communication with relevant authorities regarding information security incidents and compliance requirements. This control ensures that organisations are prepared to engage with regulatory bodies, law enforcement agencies, and other governmental entities in a structured and compliant manner.

What Is the Objective of A.5.5?

To ensure timely and effective communication with relevant authorities in case of information security incidents and to meet compliance obligations.

What Is the Scope of A.5.5?

This control applies to all departments and functions within the organisation that may need to communicate with authorities regarding information security matters.



ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.



Why Should You Comply With Annex A.5.5? Key Aspects and Common Challenges

  • Identification of Relevant Authorities:

      Challenge: Determining which authorities are relevant can be complex due to varying regulations and jurisdictions.

    • Solution: Create a comprehensive list of authorities pertinent to the organisation’s operations, considering local, national, and international regulations.
    • Clause Association: Context of the Organisation (Clause 4)
  • Maintaining Contact Information:

      Challenge: Keeping contact information up-to-date and accessible can be difficult due to staff turnover and changes in authorities.

    • Solution: Regularly review and update contact information, ensuring it is stored in a centralised, accessible location.
    • Clause Association: Support (Clause 7)
  • Defining Roles and Responsibilities:

      Challenge: Assigning and communicating roles effectively within the organisation can be challenging.

    • Solution: Clearly define and document roles and responsibilities for managing communications with authorities, ensuring all relevant personnel are aware of their duties.
    • Clause Association: Leadership (Clause 5)
  • Communication Procedures:

      Challenge: Developing clear and effective communication procedures that are understood and followed by all staff can be complex.

    • Solution: Establish detailed procedures for contacting authorities, including specific circumstances, information to be shared, and methods of communication. Regularly train staff on these procedures.
    • Clause Association: Operation (Clause 8)
  • Incident Reporting:

      Challenge: Ensuring timely and accurate reporting of incidents to authorities can be hindered by lack of clarity or delays in internal reporting.

    • Solution: Implement specific protocols and automated workflows for incident reporting to ensure timely and accurate communication with authorities.
    • Clause Association: Planning (Clause 6), Improvement (Clause 10)
  • Compliance and Legal Requirements:

      Challenge: Navigating and ensuring compliance with various legal and regulatory requirements can be overwhelming.

    • Solution: Stay informed about relevant laws and regulations, and ensure all communications comply with these requirements. Use legal expertise when necessary.
    • Clause Association: Performance Evaluation (Clause 9)
  • Training and Awareness:

      Challenge: Ensuring that all relevant personnel are adequately trained and aware of their responsibilities can be resource-intensive.

    • Solution: Develop comprehensive training programmes and regular refreshers to maintain high levels of awareness and preparedness among staff.
    • Clause Association: Support (Clause 7)

Benefits of Compliance

  • Regulatory Compliance: Ensures the organisation meets regulatory requirements related to incident reporting and communication.
  • Improved Incident Response: Facilitates faster and more coordinated responses to security incidents with the involvement of authorities.
  • Risk Mitigation: Reduces the risk of legal penalties and enhances the organisation’s reputation by demonstrating a commitment to transparency and compliance.



climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.



Example Implementation Steps and Solutions

  • Compile a List of Authorities:

      Challenge: Identifying relevant authorities across different jurisdictions.

    • Solution: Use ISMS.online’s compliance database to identify and document relevant authorities and their contact details.
    • Clause Association: Context of the Organisation (Clause 4)
  • Develop Communication Procedures:

      Challenge: Creating comprehensive and understandable procedures.

    • Solution: Leverage ISMS.online’s policy templates to create detailed procedures for when and how to contact authorities.
    • Clause Association: Operation (Clause 8)
  • Assign Responsibilities:

      Challenge: Ensuring clear assignment and understanding of roles.

    • Solution: Use ISMS.online’s role assignment features to designate specific individuals or teams responsible for managing communications with authorities.
    • Clause Association: Leadership (Clause 5)
  • Conduct Training:

      Challenge: Keeping training current and engaging.

    • Solution: Utilise ISMS.online’s training modules to train relevant staff on the procedures and importance of maintaining contact with authorities.
    • Clause Association: Support (Clause 7)
  • Regularly Review and Update:

      Challenge: Keeping information and procedures up-to-date.

    • Solution: Schedule regular reviews and updates using ISMS.online’s version control and document access features to ensure information remains current and effective.
    • Clause Association: Improvement (Clause 10)

ISMS.online Features for Demonstrating Compliance with A.5.5

  • Incident Management:
    • Incident Tracker: Helps document and manage information security incidents, including details on when and how authorities were contacted.
    • Workflow: Automates the process of incident reporting and ensures all necessary steps are followed, including communication with relevant authorities.
    • Notifications: Provides alerts and reminders to ensure timely communication with authorities during incident management.
  • Policy Management:
    • Policy Templates: Provides templates for creating communication policies and procedures, ensuring they meet ISO 27001 requirements.
    • Version Control: Ensures that the most current policies and procedures are maintained and accessible to authorised personnel.
    • Document Access: Allows secure access to policies and procedures, ensuring relevant staff can quickly find and use them when needed.
  • Audit Management:
    • Audit Templates: Helps in planning and conducting audits to verify that communication procedures with authorities are being followed.
    • Audit Plan: Organises audit activities and tracks compliance with established procedures for contacting authorities.
    • Corrective Actions: Manages any findings from audits and ensures corrective actions are implemented and documented.
  • Communication Tools:
    • Alert System: Provides a mechanism for alerting relevant personnel about the need to contact authorities.
    • Notification System: Ensures timely and targeted communication, including notifications for updates or changes in contact procedures.
  • Training Modules:
    • Training Programmes: Includes modules for training staff on communication procedures and the importance of contacting authorities.
    • Training Tracking: Monitors and records training completion, ensuring all relevant personnel are trained on procedures for contacting authorities.



ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.



Detailed Annex A.5.5 Compliance Checklist

Identification of Relevant Authorities

Identify local, national, and international regulatory bodies relevant to the organisation’s operations.

Document the contact details of each identified authority.

Regularly review and update the list of relevant authorities.

Maintaining Contact Information

Centralise and securely store contact information for relevant authorities.

Ensure contact information is accessible to authorised personnel.

Schedule periodic reviews to update and verify contact information.

Defining Roles and Responsibilities

Assign specific individuals or teams responsible for managing communications with authorities.

Document the roles and responsibilities related to contacting authorities.

Communicate these roles and responsibilities to all relevant personnel.

Communication Procedures

Develop detailed procedures for when and how to contact authorities.

Include specific circumstances and types of information to be shared in the procedures.

Regularly train staff on the communication procedures.

Incident Reporting

Implement protocols for timely and accurate reporting of incidents to authorities.

Use automated workflows to ensure all necessary steps are followed.

Maintain documentation of all incidents reported to authorities.

Compliance and Legal Requirements

Stay informed about relevant legal and regulatory requirements.

Ensure all communications with authorities comply with these requirements.

Consult legal expertise as needed to navigate complex compliance issues.

Training and Awareness

Develop comprehensive training programmes on communication procedures.

Schedule regular training sessions and refreshers for all relevant personnel.

Track training completion to ensure all staff are adequately trained.

Detailed Compliance Steps with ISMS.online Features

1. Compile a List of Authorities

Use ISMS.online’s compliance database to identify relevant authorities.

Document and store the contact details within ISMS.online’s secure document access feature.

Regularly update the list using ISMS.online’s version control.

2. Develop Communication Procedures

Utilise ISMS.online’s policy templates to create detailed procedures.

Store and manage these procedures using ISMS.online’s document access features.

Regularly review and update procedures with ISMS.online’s version control.

3. Assign Responsibilities

Use ISMS.online’s role assignment features to designate individuals responsible for contacting authorities.

Document these roles and responsibilities within ISMS.online.

Ensure all relevant personnel are aware of their roles through ISMS.online’s communication tools.

4. Conduct Training

Develop training modules within ISMS.online to educate staff on communication procedures.

Schedule and track training sessions using ISMS.online’s training tracking feature.

Provide regular refreshers and updates through ISMS.online’s training programmes.

5. Regularly Review and Update

Schedule regular reviews of contact information and procedures using ISMS.online’s document management features.

Update contact details and procedures as needed, ensuring all changes are documented with ISMS.online’s version control.

Use ISMS.online’s audit management tools to verify compliance with communication procedures.

Every Annex A Control Checklist Table

ISO 27001 Annex A.5 Control Checklist Table
ISO 27001 Control Number ISO 27001 Control Checklist
Annex A.5.1 Policies for Information Security Checklist
Annex A.5.2 Information Security Roles and Responsibilities Checklist
Annex A.5.3 Segregation of Duties Checklist
Annex A.5.4 Management Responsibilities Checklist
Annex A.5.5 Contact With Authorities Checklist
Annex A.5.6 Contact With Special Interest Groups Checklist
Annex A.5.7 Threat Intelligence Checklist
Annex A.5.8 Information Security in Project Management Checklist
Annex A.5.9 Inventory of Information and Other Associated Assets Checklist
Annex A.5.10 Acceptable Use of Information and Other Associated Assets Checklist
Annex A.5.11 Return of Assets Checklist
Annex A.5.12 Classification of Information Checklist
Annex A.5.13 Labelling of Information Checklist
Annex A.5.14 Information Transfer Checklist
Annex A.5.15 Access Control Checklist
Annex A.5.16 Identity Management Checklist
Annex A.5.17 Authentication Information Checklist
Annex A.5.18 Access Rights Checklist
Annex A.5.19 Information Security in Supplier Relationships Checklist
Annex A.5.20 Addressing Information Security Within Supplier Agreements Checklist
Annex A.5.21 Managing Information Security in the ICT Supply Chain Checklist
Annex A.5.22 Monitoring, Review and Change Management of Supplier Services Checklist
Annex A.5.23 Information Security for Use of Cloud Services Checklist
Annex A.5.24 Information Security Incident Management Planning and Preparation Checklist
Annex A.5.25 Assessment and Decision on Information Security Events Checklist
Annex A.5.26 Response to Information Security Incidents Checklist
Annex A.5.27 Learning From Information Security Incidents Checklist
Annex A.5.28 Collection of Evidence Checklist
Annex A.5.29 Information Security During Disruption Checklist
Annex A.5.30 ICT Readiness for Business Continuity Checklist
Annex A.5.31 Legal, Statutory, Regulatory and Contractual Requirements Checklist
Annex A.5.32 Intellectual Property Rights Checklist
Annex A.5.33 Protection of Records Checklist
Annex A.5.34 Privacy and Protection of PII Checklist
Annex A.5.35 Independent Review of Information Security Checklist
Annex A.5.36 Compliance With Policies, Rules, and Standards for Information Security Checklist
Annex A.5.37 Documented Operating Procedures Checklist
ISO 27001 Annex A.8 Control Checklist Table
ISO 27001 Control Number ISO 27001 Control Checklist
Annex A.8.1 User Endpoint Devices Checklist
Annex A.8.2 Privileged Access Rights Checklist
Annex A.8.3 Information Access Restriction Checklist
Annex A.8.4 Access to Source Code Checklist
Annex A.8.5 Secure Authentication Checklist
Annex A.8.6 Capacity Management Checklist
Annex A.8.7 Protection Against Malware Checklist
Annex A.8.8 Management of Technical Vulnerabilities Checklist
Annex A.8.9 Configuration Management Checklist
Annex A.8.10 Information Deletion Checklist
Annex A.8.11 Data Masking Checklist
Annex A.8.12 Data Leakage Prevention Checklist
Annex A.8.13 Information Backup Checklist
Annex A.8.14 Redundancy of Information Processing Facilities Checklist
Annex A.8.15 Logging Checklist
Annex A.8.16 Monitoring Activities Checklist
Annex A.8.17 Clock Synchronisation Checklist
Annex A.8.18 Use of Privileged Utility Programs Checklist
Annex A.8.19 Installation of Software on Operational Systems Checklist
Annex A.8.20 Networks Security Checklist
Annex A.8.21 Security of Network Services Checklist
Annex A.8.22 Segregation of Networks Checklist
Annex A.8.23 Web Filtering Checklist
Annex A.8.24 Use of Cryptography Checklist
Annex A.8.25 Secure Development Life Cycle Checklist
Annex A.8.26 Application Security Requirements Checklist
Annex A.8.27 Secure System Architecture and Engineering Principles Checklist
Annex A.8.28 Secure Coding Checklist
Annex A.8.29 Security Testing in Development and Acceptance Checklist
Annex A.8.30 Outsourced Development Checklist
Annex A.8.31 Separation of Development, Test and Production Environments Checklist
Annex A.8.32 Change Management Checklist
Annex A.8.33 Test Information Checklist
Annex A.8.34 Protection of Information Systems During Audit Testing Checklist

How ISMS.online Help With A.5.5

Implementing and demonstrating compliance with ISO 27001:2022 can be complex, but with the right tools, it becomes a manageable and efficient process. ISMS.online provides a comprehensive suite of features designed to streamline your compliance efforts, including robust tools for incident management, policy management, audit management, communication, and training.

Ready to enhance your information security management system? Contact ISMS.online today to discover how our platform can support your organisation in achieving and maintaining ISO 27001:2022 compliance. Book a demo today.


Toby Cane

Partner Customer Success Manager

Toby Cane is the Senior Partner Success Manager for ISMS.online. He has worked for the company for close to 4 years and has performed a range of roles, including hosting their webinars. Prior to working in SaaS, Toby was a Secondary School teacher.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on crystal

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Fall 2025
High Performer, Small Business - Fall 2025 UK
Regional Leader - Fall 2025 Europe
Regional Leader - Fall 2025 EMEA
Regional Leader - Fall 2025 UK
High Performer - Fall 2025 Europe Mid-market

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.