Why your MSP supply chain is now one of your biggest risks
Your MSP supply chain is now one of your biggest risks because you remain accountable for every supplier that underpins your services. Customers, regulators and auditors expect you to understand how those suppliers perform, what risks they introduce and how changes to their services are controlled. This expectation is reflected in widely used standards such as ISO/IEC 27001:2022 and its supplier controls, including Annex A.5.22, which call for structured monitoring, risk review and change management for third parties (ISO/IEC 27001 overview). When supplier oversight becomes a formal part of your ISMS, you gain the visibility and discipline needed to prevent outages, data loss, lost tenders and uncomfortable audit findings.
Your MSP’s supplier chain has become one of your biggest security and resilience risks because failures or quiet changes at upstream providers can quickly cascade into your services. When you treat supplier oversight as a formal part of your information security management system, rather than an informal background task, you gain the visibility and control needed to prevent outages, data loss, lost tenders and uncomfortable audit findings.
Your services now ride on a dense stack of cloud, connectivity, security and tooling suppliers, so weaknesses in that chain can quickly become your problem. In the past you might have relied on contracts, SLAs and good relationships; today customers, regulators and auditors expect you to understand how those suppliers perform, what risks they introduce and how changes to their services are controlled. ISO 27001:2022 Annex A.5.22 makes that expectation explicit and turns supplier oversight into a core part of your ISMS rather than an informal activity.
In the 2025 ISMS.online survey, about 41% of organisations named managing third‑party risk and tracking supplier compliance as one of their top information‑security challenges.
As an MSP, you are both a supplier and a customer. You promise availability, security and compliance to your clients, but you can only keep those promises if the suppliers underneath you keep theirs. A single failure or quiet change at a cloud platform, security vendor or network provider can cascade across many of your customers at once, creating outages, data exposure, broken SLAs and reputational damage.
Strong supplier oversight turns hidden dependencies into manageable commitments.
Modern attacks and incidents frequently traverse supply chains rather than targeting organisations directly. Industry breach studies, including recurring reports from global carriers and security providers, regularly highlight third‑party and supply‑chain paths as significant attack vectors (industry breach reports). That makes “we trust our vendors” a risky position. The real question is whether you can show, in a structured way, how you monitor those vendors, how often you review them and how you decide whether to accept, treat or exit the risks they create.
For many MSPs, supplier oversight is still handled through scattered emails, spreadsheet lists, meeting notes and personal relationships. That approach works until a key individual leaves, a supplier makes an unexpected change or an auditor asks for evidence. At that point the lack of a repeatable oversight discipline becomes painfully visible and can spill into lost business and awkward insurance discussions.
A structured approach to supplier oversight does not have to mean heavy bureaucracy. It means deciding which suppliers really matter, setting clear expectations, checking that they are being met and recording how you respond when they are not. When you treat that as part of resilience and service quality, rather than as a narrow compliance chore, it becomes easier to justify the time you spend on it.
ISMS.online is designed to help you make that shift. You can centralise your supplier register, classify critical vendors, link them to your services and assets, and manage the monitoring, review and change‑control activities that ISO 27001:2022 expects, all in one environment instead of across inboxes and shared drives.
How MSP supply chains typically grow out of control
MSP supply chains typically grow out of control because each individual sourcing decision seems reasonable, yet together they create a stack nobody fully understands. You add cloud, connectivity, backup, security and specialist SaaS suppliers over time, often in response to specific client demands. Without a deliberate effort to map and maintain this landscape, it becomes hard to say which providers are truly critical and where client data actually flows.
MSP supply chains usually grow out of control because each sensible sourcing decision adds complexity until nobody can fully describe the overall stack. Analysis of digital supply chains and concentration risk by policy institutes has noted similar patterns of layered, opaque dependencies that few organisations can fully map (analysis of digital supply‑chain concentration risk). Over time you accumulate dozens of services, from connectivity and cloud platforms to niche SaaS tools, and it becomes hard to see which providers are truly critical and where your customers’ data actually flows.
Your supplier list often starts out simple: a connectivity provider, a cloud platform and a helpdesk tool. Over time you add backup and recovery services, security tools, monitoring platforms, professional services partners and niche SaaS products. Each decision may have been sensible on its own, but the cumulative result is a layered digital supply chain that few people can fully describe or risk‑assess.
In that environment, it is easy to lose track of who is critical, which suppliers process or store client data, where data actually resides and which contracts contain the security and continuity commitments you rely on. Without a clear map, you cannot easily answer basic questions such as “which upstream providers could take multiple customers offline at once?” or “which suppliers would trigger client or regulatory notification obligations if they were compromised?”
Creating that map is the first practical step towards effective oversight. It lets you separate truly critical suppliers from low‑risk vendors and focus your monitoring and review effort where it matters most, rather than spreading scarce time and attention thinly across every supplier.
What ISO 27001:2022 A.5.22 actually expects you to do
ISO 27001:2022 A.5.22 expects you to monitor the performance of key suppliers, review the risks they create and control changes to their services in a structured way. In practice this turns supplier management from occasional contract discussions into a repeatable oversight process inside your ISMS. You should be able to show what you monitor, how often you review suppliers and how you decide whether to accept, treat or exit the risks they create.
ISO 27001:2022 A.5.22 expects you to monitor how key suppliers perform, review the risks they create on a regular basis and control changes to their services in a way that protects information security. In practice that means turning supplier management from occasional contract negotiations into a routine, evidence‑backed oversight process that fits inside your ISMS and can be explained to customers, auditors and leadership.
ISO 27001:2022 Annex A.5.22 can be intimidating on first reading, but in practice it boils down to three verbs: monitor, review and control changes to supplier services. The control text in the ISO/IEC 27001:2022 standard emphasises monitoring supplier performance, reviewing associated risks and managing changes to supplier services in a way that protects information security (ISO/IEC 27001:2022 standard). The control expects you to watch how suppliers perform, periodically reassess the risks they introduce and handle changes to their services through a defined process that considers information security before you agree to them.
The “monitor” element means you determine what needs to be watched for each important supplier and how you will do it. That usually includes service levels such as uptime and response times. In an ISO context it also means monitoring security‑relevant aspects: how quickly issues are communicated, how incidents are handled, whether agreed security activities are completed on time and whether the supplier continues to meet the certifications or standards you rely on.
The “review” element means you do not treat supplier risk as fixed at onboarding. You schedule periodic reviews of critical suppliers to confirm that your assumptions about their security, resilience and compliance still hold. Those reviews might involve examining updated assurance reports, revisiting risk assessments, checking whether contractual controls are still appropriate and looking at incident trends over the period.
The “change management” element requires you to manage changes in supplier services in a controlled way. That covers technical changes such as new infrastructure or data centre moves, organisational changes such as ownership or locations and contractual changes such as scope, SLAs or data‑processing terms. You are expected to assess the impact of those changes on information security and service delivery, approve or reject them and update your documentation accordingly.
How A.5.22 fits with the other supplier controls
A.5.22 fits with the other supplier controls by making sure your contractual expectations remain effective and proportionate as services change. Other controls focus on defining security requirements and embedding them into agreements; A.5.22 ensures those requirements are monitored, reviewed and adapted over time. Together they create a complete governance loop for third‑party risk, rather than a one‑off procurement exercise.
A.5.22 does not stand alone. ISO 27001:2022 includes several related controls that, together, form a complete picture of supplier governance. Other supplier‑focused controls expect you to define information security requirements for suppliers, include those requirements in contracts and manage ICT supply‑chain risks more broadly.
Taken together, they require you to:
- Decide what you need from suppliers in security and resilience terms.
- Write those expectations into agreements.
- Monitor and review whether those expectations are being met.
- Manage changes and emerging risks over time.
A.5.22 is the part that turns static agreements into living oversight. It is the mechanism that ensures supplier controls stay effective as services, technologies and business conditions change, and it gives you a clear storey to tell when customers or auditors ask how you govern third‑party risk.
Translating control text into practical artefacts
You translate A.5.22 into practice by creating a small set of standard artefacts and keeping them in one place. A supplier register, monitoring records, review notes and a simple change‑management log are usually enough. When these are captured in a central ISMS workspace, they become both operational tools for your teams and clear evidence for auditors and customers that supplier oversight really happens.
The standard does not prescribe specific documents, but audit and conformity‑assessment guidance consistently emphasises the need for tangible evidence that controls such as A.5.22 are operating, rather than just being written down (audit and conformity‑assessment guidance). In practice, that usually means you can show:
- A supplier register that identifies critical suppliers and their owners.
- Defined monitoring activities for those suppliers, such as SLAs, KPIs and security indicators.
- Records of periodic supplier reviews and any resulting actions.
- Records of supplier‑related changes, their impact assessments, approvals and communications.
If you keep these records in a structured way, they serve two purposes. They help you run the business more safely, and they give auditors and customers assurance that your oversight is not just theoretical.
A short comparison clarifies the shift from informal to structured oversight:
| Area | Informal supplier oversight | Structured, A.5.22‑aligned oversight |
|---|---|---|
| Monitoring | Ad‑hoc checks, occasional complaints | Defined SLAs/KPIs, security indicators and owners |
| Reviews | Rare, unrecorded conversations | Scheduled reviews with documented outcomes and follow‑up actions |
| Change management | Email notifications, informal approvals | Logged change requests, impact assessments and clear decisions |
| Audit evidence | Scattered emails and spreadsheets | Central register with linked monitoring, reviews and changes |
An ISMS platform such as ISMS.online can make this easier by giving you defined areas for supplier records, links to risks, incidents and assets, and configurable workflows for monitoring, reviews and change approvals. That way, the evidence you need for A.5.22 emerges naturally from your day‑to‑day work rather than from last‑minute document hunting before an audit.
ISO 27001 made easy
An 81% Headstart from day one
We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.
The specific risks of weak supplier oversight for MSPs
Weak supplier oversight exposes your MSP to operational, contractual and reputational risks that often appear at scale because many customers depend on the same upstream platforms. When you do not monitor, review or manage supplier changes in a structured way, avoidable surprises turn into outages, compliance problems and difficult conversations with clients, insurers and auditors.
The 2025 ISMS.online State of Information Security report finds that most organisations have already been affected by at least one third‑party security incident.
If you do not actively monitor, review and control changes to your critical suppliers, you expose your MSP and your customers to a set of predictable, avoidable risks. These risks are not abstract; they show up as outages, breaches, strained client relationships, difficult insurance conversations and painful audits that undermine your reputation.
At a basic level, weak oversight means you may not realise a supplier is underperforming or drifting away from your expectations until customers complain or an incident occurs. Without visibility of trends, you cannot intervene early. You also cannot easily demonstrate to auditors or clients that you took reasonable steps to manage the risk.
More seriously, weak oversight can allow significant changes to slip through without proper consideration. A supplier might move data processing to a new region, change a sub‑processor, deprecate a security feature, alter their incident‑reporting process or change service capacity in ways that affect your own SLAs. If those changes are only noticed informally, you may find yourself out of compliance with contracts or regulation without any conscious decision having been made.
There is also reputational and commercial risk. When a supplier in your stack fails, your clients often experience it simply as “our MSP is down” or “our MSP lost our data.” Whether or not that is fair, it is usually how the storey is told. Without strong, visible supplier governance, you have little basis to explain what happened or to show that you took your responsibilities seriously.
How supplier failures can cascade across your customer base
Supplier failures can cascade across your customer base because many of your clients rely on the same upstream platforms, security tools and network providers. Research into digital supply‑chain and concentration risk has highlighted how failures in a shared upstream platform can impact many downstream organisations at once, which maps directly onto the MSP model (digital supply‑chain concentration risk). A single incident or poorly managed change can therefore affect dozens of customer environments at once and stretch your team’s capacity to respond. Without clear oversight, you will struggle to identify who is impacted, what contracts are affected and which obligations you must meet.
Unlike an internal system used by one organisation, many of your suppliers sit underneath multiple customers at once. A failure or change can therefore have a multiplier effect. If a core cloud service, security product or connectivity provider suffers an outage or pushes a problematic update, it can disrupt dozens or hundreds of customer environments simultaneously and stretch your team’s capacity to respond.
If you do not have clear monitoring and a coherent picture of your dependencies, it is hard to answer simple questions during a crisis: which customers are impacted, what contractual obligations are triggered, what notifications are required and what options you have to mitigate the impact. That slows your response and increases the risk of penalties, churn and legal disputes.
By identifying which suppliers can cause this kind of systemic impact, and by treating them as a distinct class in your oversight framework, you can apply stricter monitoring, more frequent reviews and tighter change control where it makes the biggest difference to resilience and customer trust.
Contractual, regulatory and insurance surprises
Contractual, regulatory and insurance surprises tend to emerge when your informal supplier practices do not match the promises in contracts, policies and guidance. Only when something goes wrong do you discover that customers, regulators or insurers expected more structured third‑party governance. A.5.22 gives you a discipline for aligning expectations with reality before incidents force the issue.
In the 2025 ISMS.online survey, only about 29% of organisations said they received no fines for data‑protection failures, meaning most had faced some level of financial penalty.
Many MSPs discover the full implications of their supplier relationships only when something goes wrong. Cyber insurance policies, client contracts and regulatory guidance often contain expectations about how you manage third‑party risk, how quickly you must notify customers and authorities and how responsibility is allocated when a supplier fails. Legal and consulting analyses of cyber insurance and outsourcing contracts frequently draw attention to clauses on third‑party risk management, notification timelines and allocation of responsibility between providers and their suppliers (legal and consulting analyses).
If you have not mapped those expectations to your supplier oversight practices, you may find that your informal habits do not meet the standard you have implicitly agreed to. For example, if a contract assumes you will be notified promptly of relevant supplier incidents, but in practice you are not monitoring for such notifications, you may be judged to have fallen short even if the root cause lay upstream.
A.5.22 gives you a structure for avoiding these surprises by making regular review and change management part of your ISMS, not just part of commercial negotiation. That structure helps you show customers, regulators and insurers that you treat supplier risk as a managed part of your governance, not an afterthought.
How to design an MSP supplier oversight framework for A.5.22
You design an effective supplier oversight framework for A.5.22 by defining clear roles, segmenting suppliers by criticality and data sensitivity, agreeing standard records for each tier and linking everything back into your wider ISMS processes. The framework can be light, but it must be consistent, repeatable and easy to evidence for auditors and demanding customers.
A structured supplier oversight framework turns the ideas in A.5.22 into a set of repeatable processes that fit your MSP. It clarifies who does what, for which suppliers, how often and using which evidence. It also makes it easier to explain your approach to auditors, customers and internal stakeholders.
The framework does not have to be complex. It should reflect your size, risk profile and resource constraints. The key is consistency: similar suppliers should be treated in similar ways, and decisions should be recorded so that you can show what was done and why.
At a minimum, your framework should define governance roles and forums, supplier segmentation, standard records you maintain for each supplier and how these activities connect to your broader ISMS processes such as risk management, incident management and business continuity.
Setting governance ownership and forums
Governance ownership and forums make sure supplier monitoring results, incidents and proposed changes are seen by the right people and turned into decisions. Without clear ownership, supplier risk becomes everyone’s problem and nobody’s responsibility. A.5.22 works best when you can point to named owners, defined meetings and consistent decision‑making routes.
Start by deciding who owns supplier risk and who owns day‑to‑day monitoring. In many MSPs, information security or a virtual CISO owns the risk view, while service delivery or operations owns performance and incident oversight. Procurement or commercial teams usually own contracts and negotiations.
You should then define a regular forum where these perspectives come together for critical suppliers. That might be a quarterly supplier review meeting or an agenda item on an existing service governance board. The forum should look at monitoring data, recent incidents, review outcomes and upcoming or proposed changes, and it should be able to make or recommend decisions.
Clear ownership and forums mean monitoring results and concerns have somewhere to go. Without that, data is collected but not acted upon, and leadership does not get a coherent picture of third‑party risk.
Segmenting suppliers by criticality and data sensitivity
Segmenting suppliers by criticality and data sensitivity lets you apply stronger oversight to vendors that could cause the most damage, while keeping the burden light for low‑risk tools. It is one of the most effective ways to make A.5.22 proportionate and sustainable for your team.
Not all suppliers warrant the same level of attention. Segmenting them allows you to focus your efforts. Common dimensions include:
- Business criticality: how much service or revenue disruption their failure would cause.
- Data sensitivity: whether they process or store client data, especially personal or regulated data.
- Substitution difficulty: how hard it would be to replace them if needed.
You can combine those into tiers, such as “critical client‑facing platforms”, “security stack components”, “supporting tools” and “low‑impact utilities”. For each tier, you define minimum oversight activities: monitoring metrics, review frequency, assurance requirements and change‑control expectations.
Platforms like ISMS.online can help you maintain this segmentation by linking suppliers to services, assets and data types, and by driving different workflows based on supplier tier. That makes it easier for you as a leader to see where oversight effort is concentrated and for your teams to focus where it adds the most value.
Defining standard artefacts and where they live
Standard artefacts give your framework a concrete shape: every critical supplier has the same core records, kept in the same place, so you can answer questions quickly and demonstrate control. When those records sit in a single ISMS environment rather than across inboxes, the administrative burden goes down rather than up.
To make the framework auditable and usable, agree the core artefacts you will maintain for each supplier tier and where they will be stored. Typical artefacts include:
- Supplier profile, contracts and security requirements.
- Risk assessment and risk rating.
- Agreed SLAs, KPIs and any security‑specific measures.
- Monitoring records such as performance reports.
- Review notes and actions.
- Change requests, impact assessments and approvals.
If those artefacts are captured in a central ISMS workspace such as ISMS.online rather than spread across email, contract repositories and IT service management tools, you reduce the effort needed to prepare for audits or respond to client questions. You also ensure everyone works from the same view of supplier risk, rather than from their own partial records.
Free yourself from a mountain of spreadsheets
Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.
Turning SLAs, KPIs and KRIs into meaningful supplier monitoring
You turn SLAs, KPIs and KRIs into meaningful supplier monitoring by selecting a small set of measures that genuinely indicate performance and risk, then reviewing and acting on them regularly. Metrics only create value when they trigger questions, escalations or decisions about suppliers, rather than sitting in dashboards that nobody reads.
Monitoring under A.5.22 is not just about collecting numbers for their own sake. It is about having the right information to decide when to intervene, escalate, renegotiate or reassess risk. That means you should choose metrics that genuinely indicate supplier performance and emerging risk, and that you can realistically track and discuss.
For an MSP, monitoring should combine service performance measures with security and compliance indicators. It should also support different levels of detail: operational metrics for service teams and summarised indicators for leadership and governance forums who need to understand risk without getting lost in raw logs.
When you design your monitoring approach, work backwards from the decisions you need to make: when would you escalate to a supplier, when would you review a contract, when would you reconsider using a vendor and when would you notify clients about supplier‑driven issues?
Choosing the right metrics for MSP supplier oversight
The right metrics for MSP supplier oversight are those that highlight when a supplier is drifting away from acceptable performance or risk before customers suffer the impact. That usually means a blend of availability, responsiveness, incident handling quality and indicators of emerging security concerns, not an exhaustive catalogue of every figure you could measure.
Useful performance indicators might include uptime, incident response times, resolution times, backlog levels and frequency of SLA breaches. For each critical supplier, you should know what you expect and have a way to check whether those expectations are being met over time, not just at renewal.
Risk‑oriented indicators can show where attention is needed even when headline SLAs are technically achieved. These could include the number of high‑severity findings from supplier assessments, delays in implementing security patches, frequency of unplanned changes or reliance on single points of failure in the supplier’s architecture.
The goal is not to create dozens of metrics for every supplier, but to identify a small, meaningful set for each critical vendor that you actually use in discussions and decisions. That keeps the monitoring burden manageable and makes it easier to explain your approach to leadership.
Aligning supplier SLAs with your own commitments
Aligning supplier SLAs with your own commitments ensures you are not promising customers more than your upstream providers can realistically deliver. Where you deliberately choose to offer stronger guarantees, you do so with a clear mitigation plan, rather than discovering the gap only when something goes wrong.
A common problem in MSP environments is misalignment between the SLAs you guarantee to your customers and the SLAs your suppliers give you. If you promise higher availability or faster response than your own upstream providers, you are accepting a structural risk that will be hard to manage, no matter how diligent your operations team is.
Under A.5.22, it makes sense to surface these misalignments consciously. For critical suppliers, you may decide that client‑facing SLAs must not exceed upstream guarantees. Where you choose to accept a gap-for example, because you layer redundancy or use multiple suppliers-you should record that decision and show how you mitigate the risk.
Monitoring then becomes not just a technical exercise, but a way of checking whether the assumptions behind those decisions still hold and whether you should revisit them as services, demand or risk appetite change.
Recording, discussing and reporting monitoring results
Recording, discussing and reporting monitoring results turns raw metrics into governance and evidence. It allows your teams to spot trends, agree actions with suppliers and explain performance to customers, auditors and leadership with confidence instead of guesswork.
Metrics have limited value if they are not discussed or acted on. You should standardise how monitoring results are captured, how often they are reviewed and who sees them. At the operational level, you might maintain supplier scorecards and integrate key metrics into your service review meetings, where operational issues and customer feedback are already discussed.
At the governance level, you may present a consolidated view of supplier performance and risk trends to leadership or a risk committee. That helps decision‑makers see whether current suppliers remain fit for purpose and where investment or change may be needed.
An ISMS platform can support this by linking monitoring data to supplier records and by providing simple dashboards that distinguish between internal issues and supplier‑driven issues. That distinction can be invaluable when explaining service performance to customers or auditors, and when deciding where to focus improvement efforts.
Building a practical review and governance cadence for suppliers
A practical review and governance cadence means reviewing suppliers often enough to keep your risk picture current, but not so often that reviews become box‑ticking exercises. By combining scheduled reviews with clear triggers, you focus effort on the suppliers that matter most and keep A.5.22 manageable for your team and leadership.
Two‑thirds of organisations in the 2025 ISMS.online State of Information Security report say the speed and volume of regulatory change are making compliance harder to sustain.
Monitoring tells you what is happening; reviews help you decide what to do about it. Under A.5.22, you are expected to review supplier services, risks and controls at intervals that make sense for their criticality and to adjust your response accordingly, rather than leaving decisions to ad‑hoc conversations.
A practical cadence avoids two extremes: never revisiting supplier risk after onboarding, and constantly re‑assessing suppliers in a way that wastes time. The right balance depends on your risk appetite, regulatory context and the nature of your services, but in general you will want more frequent and deeper reviews for a small number of critical suppliers, and lighter, less frequent reviews for low‑risk vendors.
Setting review frequencies and standard checks
Setting review frequencies and standard checks gives your team a clear schedule and checklist for examining each supplier. That consistency is what auditors look for and what helps you compare suppliers fairly over time, rather than reacting only when something goes wrong.
For many organisations, annual-or in some cases more frequent-reviews for critical platforms and security providers are a sensible starting point. For lower‑impact tools, it can be reasonable to review them less often, for example every couple of years, using a much lighter touch. The exact intervals should reflect your regulatory context, risk appetite and the pace of change in the services you buy.
Each review should cover at least:
- Updated assurance evidence such as audit reports or certifications.
- Incident history and how issues were handled.
- Changes in services, locations, sub‑processors or ownership.
- Whether contractual terms and security requirements are still adequate.
- Whether the supplier’s risk rating should be adjusted.
By standardising these elements, you make reviews more efficient and ensure important topics are not overlooked. It also makes it easier for you, as an MSP leader, to see when suppliers are trending in the wrong direction and to decide what to do about it.
Building triggers for out‑of‑cycle reviews
Triggers for out‑of‑cycle reviews ensure you revisit supplier risk promptly when something important changes, rather than waiting for the next scheduled meeting. When you connect real‑world events back into your formal risk view, you stop treating incidents as isolated one‑offs and start treating them as signals about supplier suitability.
Not all reviews should wait for the next calendar date. Certain events should automatically trigger a new assessment of supplier risk and, if necessary, changes in how you work with the supplier. Examples include:
- Significant or repeated incidents.
- Notice of major service changes or migrations.
- Changes in ownership, key locations or sub‑processors.
- Adverse findings in external reports or news.
Documenting these triggers and linking them to your incident and change processes helps ensure that real‑world developments are fed back into your supplier risk view, rather than being handled purely as short‑term operational problems. This makes it easier to explain to boards and auditors how you stay alert to emerging third‑party risk.
Closing the loop with governance decisions
Closing the loop with governance decisions shows that reviews and triggers lead to clear choices about how you handle supplier risk. In practice that means deciding whether to accept, treat, transfer or exit the risk for each supplier, recording the reasoning and following through on actions. Those decisions are what turn A.5.22 from paperwork into real governance that protects your customers and business.
Reviews and triggers are only useful if they lead to decisions. For each supplier, you should be able to show whether you accept, treat, transfer or consider exiting the risk given the information available. You should also be able to show who made those decisions and when.
Those decisions might include actions such as requiring remediation from the supplier, tightening monitoring, adjusting your own controls, changing contractual terms, reducing reliance on the supplier or planning a transition to an alternative. Over time, these actions shape your supplier portfolio and your resilience.
Recording those decisions in your ISMS, alongside the review and monitoring data, demonstrates to auditors and clients that you are not only collecting information but also governing based on it. It also gives you a clear audit trail if you ever need to explain why you stayed with or moved away from a particular vendor.
Manage all your compliance, all in one place
ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.
Making supplier change management part of your normal way of working
You make supplier change management part of your normal way of working by routing relevant supplier changes through the same structured process you use for internal changes. Important changes are then assessed, approved, implemented and documented consistently, regardless of where they originate, and you can show that third‑party changes are not treated as exceptions.
Changes in supplier services are inevitable. Vendors evolve their platforms, relocate infrastructure, change sub‑processors, update security measures, alter pricing and adjust contractual terms. Under A.5.22, you are expected to manage those changes so they do not introduce unmanaged risk, and so you can explain your decisions afterwards. Annex A.5.22 in ISO/IEC 27001:2022 explicitly calls for changes to supplier services to be controlled in a way that maintains information security and supports accountable decision‑making (ISO/IEC 27001:2022 supplier control).
The simplest way to do this is to integrate supplier changes into your existing change‑management process instead of creating a separate, parallel track. That ensures changes are assessed, approved, implemented and documented in a consistent way, whether the change originates inside your organisation or at a supplier.
To do this, you need to be clear about which kinds of supplier changes matter, what impact assessment looks like and how you will handle emergency changes without collapsing your control environment or delaying urgent fixes.
Identifying which supplier changes must be controlled
You identify which supplier changes must be controlled by focusing on those that affect data, access, availability, compliance obligations or key integrations. Not every feature tweak needs review, but changes with security or service impact should never slip through unnoticed or unrecorded if you want to stay aligned with A.5.22.
Not every supplier change needs formal treatment. You might focus on changes that can affect:
- Where data is stored or processed.
- Who has access to data or systems.
- Availability or performance of services.
- Compliance obligations, such as the scope of data‑processing agreements.
- Integration points that your own services depend on.
You can define categories of change-such as standard, significant and emergency-with different levels of scrutiny. For each category, specify what information you expect from the supplier, who must be involved in assessing it and what records you will keep. That makes it easier for your team to know which changes can flow quickly and which need deeper review.
Designing impact assessment and decision paths
Impact assessment and decision paths for significant supplier changes ensure that security, privacy, operational and contractual implications are considered together before you commit. Clear approval routes prevent rushed decisions that store up risk, and they give you a traceable storey to show customers, auditors and insurers if a change later causes issues.
For significant changes, impact assessment should consider security, privacy, operational and contractual aspects. That typically involves information security, legal or privacy, service delivery and commercial stakeholders who can assess different angles of the risk.
The assessment should ask whether the change increases risk, and if so, whether it can be mitigated. It should consider whether the change requires updates to your own controls, documentation or client communications, and whether you need to adjust contracts, SLAs or data‑processing terms to stay aligned.
Once the assessment is complete, you decide whether to accept the change, negotiate modifications, implement compensating controls or, in rare cases, begin planning to move away from the supplier. Whatever you decide, you should record the reasoning so you can explain it to clients, auditors or insurers if needed.
Handling emergency changes and client communication
Handling emergency changes and client communication well allows you to act quickly when a supplier must move fast, without sacrificing traceability or trust. You still log the change, capture basic risk considerations and commit to a retrospective review once the immediate issue is resolved, so you can close any gaps calmly later.
Some supplier changes, especially those related to urgent security issues, cannot wait for full governance cycles. For these, you should define emergency pathways that allow rapid action while still capturing key information and follow‑up steps. That might involve shorter approvals from a smaller group of decision‑makers, with a clear requirement to review the change afterwards.
Even in emergencies, you can at least ensure the change is logged, that basic risk considerations are recorded and that retrospective review is scheduled. That way, you can tighten controls or adjust arrangements once the immediate risk is addressed and avoid building a backlog of unassessed changes.
Client communication is also part of change management. If a supplier change will affect your customers, you need a plan for explaining what is happening, how you are managing it and what they should expect. Good communication can preserve trust even when the root cause lies with a supplier and shows that you treat third‑party changes as part of your responsibility.
ISMS.online can support all of this by linking supplier change records to your broader change‑management process, risks, assets and customer communications, so you have a single narrative of what changed, why and how you responded.
Book a Demo With ISMS.online Today
ISMS.online gives MSP leaders a clear, auditable way to show that supplier oversight is built into everyday work rather than bolted on at audit time. When you can see your critical suppliers, risks, controls and evidence in one place, it becomes much easier to keep promises to customers and satisfy ISO 27001:2022 A.5.22 at the same time.
How a short demo removes guesswork from MSP supplier oversight
A short demo helps you see exactly how an A.5.22‑aligned oversight model would look for your MSP, from the first supplier record through to change approvals and review notes. Instead of trying to imagine how your current spreadsheets and email trails might hold up in an audit, you can explore a single environment where supplier registers, monitoring data, reviews and change decisions are already structured and easy to navigate.
If you are an MSP owner or leader, a walkthrough can show you what it looks like when your critical supplier map, monitoring data, review history and change decisions are visible in one view instead of across scattered files and inboxes. That makes it easier to answer tough questions from boards, auditors and clients about how you control third‑party risk, and it gives you a concrete way to move from informal habits to disciplined governance without overwhelming your team.
During that session you can also explore how supplier oversight fits alongside the rest of your ISMS work, including risk management, incident handling and business continuity. Seeing those connections often clarifies where to start and how to phase your improvements so you can build control and evidence steadily rather than trying to fix everything at once.
What MSP leaders and teams typically explore in a pilot
In a pilot, MSP leaders and their teams usually explore how ISMS.online can help them capture supplier information once and reuse it across risk, monitoring, reviews and change management. That experience makes it easier to decide whether a formal rollout will save time, reduce audit stress and strengthen customer confidence in your services.
If you run service delivery, operations or security, you can see how supplier SLAs, KPIs and incidents can sit alongside your existing IT service‑management processes rather than creating extra administrative work. You can explore how review cadences, risk assessments and change approvals can be driven by clear workflows and reminders instead of relying on memory and manual lists.
If you are preparing for an ISO 27001:2022 audit, a transition to the new version or a demanding customer due‑diligence exercise, you can use a pilot with one or two critical suppliers to validate your approach. That pilot can demonstrate to auditors and clients that you not only understand A.5.22 but have embedded it into your daily governance and supplier management.
Choosing ISMS.online does not remove the need for you to make decisions about your suppliers, but it gives you a structured environment in which to make, record and evidence those decisions. If you want supplier oversight that is provable, sustainable and aligned with ISO 27001:2022, ISMS.online is a practical way to support your team and show customers that you are a trusted, resilient partner over the long term.
Book a demoFrequently Asked Questions
How does ISO 27001 A.5.22 change supplier oversight for an MSP in practice?
ISO 27001 A.5.22 shifts you from “we have contracts” to “we can demonstrate live, risk‑based control over the suppliers our services depend on.” For a managed service provider, that means supplier governance must sit inside your everyday service management, not in a procurement folder you open once a year.
What does “live control” over suppliers actually look like?
A.5.22 expects you to be able to pick any important supplier and show, quickly and calmly, why you are still comfortable relying on them. In practice, that means you can evidence:
- Ownership: a named person in your team who owns the relationship and the risk.
- Expectations: a short, documented set of KPIs/KRIs tied to availability, security and customer impact.
- Oversight: a trail of reviews, decisions and follow‑up actions, not just an initial due‑diligence questionnaire.
- Change handling: examples where significant supplier changes went through your change control, with impact assessed and mitigations agreed.
For MSPs, this often feels like stepping up from transactional vendor management to ongoing supplier governance. It makes you more resilient, and it’s exactly what enterprise customers, regulators and cyber‑insurers now expect when they ask, “How do you manage your supply chain?”.
If you don’t want that to turn into yet another spreadsheet burden, your ISMS should carry the weight. ISMS.online lets you keep a central supplier register, link each supplier to risks, incidents, KPIs/KRIs and reviews, and build a simple, defensible storey you can reuse in ISO 27001 audits, customer due‑diligence and cyber insurance renewals.
Which MSP suppliers are truly “critical” under A.5.22, and how can you tier them without overcomplicating things?
A supplier is critical when a failure, breach or unannounced change on their side could damage multiple customers, sensitive data or your ability to deliver core services. ISO 27001 A.5.22 doesn’t give you a list, but it does expect your oversight to be risk‑based and explainable.
How can you define tiers that your team will actually use?
A practical way to tier suppliers is to score them on impact and substitutability:
- Impact: how much customer harm, data exposure or downtime could they cause if things go wrong?
- Substitutability: how quickly and safely could you move away if you had to?
Most MSP portfolios then fall naturally into three tiers:
Tier 1 – Service‑defining platforms
These underpin large parts of your revenue and your customers’ trust:
- Public cloud and data‑centre providers.
- Connectivity and core RMM/PSA tools.
- Key security platforms such as email security, EDR, backup/DR, identity.
A single failure or design change here can break SLAs for dozens of customers or expose large datasets. They justify your tightest governance: named owner, defined KPIs/KRIs, deeper annual review and controlled change handling.
Tier 2 – Important but replaceable services
These matter, but you have more options:
- Specialist SaaS used by a subset of customers.
- Monitoring add‑ons or niche security tools.
- Vertical line‑of‑business platforms.
Issues here are painful but usually containable. Lightweight KPIs, some basic security checks and annual or biennial reviews are usually enough.
Tier 3 – Low‑impact utilities
Here disruption is mainly internal and short‑lived:
- Documentation utilities, small collaboration tools, internal HR/finance services.
A simple register entry, plus review on change or incident, is often proportionate.
Once those tiers are agreed, you can apply different expectations by tier without creating unnecessary admin. In ISMS.online you can record the tier for each supplier, philtre reviews and actions by tier and design different workflows, so your team spends its energy where a supplier failure would really hurt your customers and your reputation.
What supplier KPIs and KRIs actually convince an ISO 27001 auditor that you’re in control?
Auditors are not impressed by endless dashboards; they want to see that you measure the few things that really matter and act when they move. For an MSP, the most persuasive indicators cluster around availability, security and dependency.
Which measures give you a strong signal without overwhelming your team?
You can usually cover what an auditor needs with a small, focused set of indicators:
Performance indicators (KPIs)
- Uptime versus SLA: for core platforms over the last 6–12 months, with any service credits or corrective actions recorded.
- Supplier‑related ticket metrics: – average resolution times where the supplier is the bottleneck.
- Execution of agreed security tasks: – completion rates for patch windows, restore tests or attestations the supplier has committed to.
Risk indicators (KRIs)
- Open assurance findings: – number and severity of unresolved issues from SOC 2 / ISO 27001 reports or internal assessments.
- Overdue remediation actions: – agreed fixes that are past their due date, especially for Tier‑1 suppliers.
- Unplanned change frequency: – how often material changes land with little or no notice.
- Concentration risk: – where one supplier underpins multiple high‑impact services or a large slice of revenue.
These become compelling when they are clearly linked to behaviour: they show up on review agendas, they drive risk score changes, they trigger design updates or tough conversations with suppliers.
If you hold suppliers, KPIs/KRIs, risks and reviews together in ISMS.online, you can respond confidently when an auditor or customer asks, “Why are you still comfortable with this vendor?” or “What changed after their last incident?”. You simply walk them through the metrics, the discussion notes and the actions you’ve already taken, all in one system rather than spread across inboxes and ad‑hoc files.
How should an MSP route supplier changes so they don’t quietly introduce new risk?
Many serious supplier problems start with a quiet change rather than a dramatic outage: a new data‑centre region, an extra sub‑processor, updated SLAs or a support model tweak. A.5.22 expects you to treat significant supplier changes as controlled changes in your environment, not as background noise.
Which types of supplier change deserve formal impact assessment?
You don’t need to escalate every cosmetic update, but some categories should always trigger a structured look:
- Major version upgrades or platform redesigns.
- New core components or dependencies in your service stack.
- Removal of features you rely on for resilience or security.
These can alter failure modes, performance and integration patterns for many customers at once.
Data, access and jurisdiction changes
- New hosting regions or data‑centres, especially across legal boundaries.
- Additional sub‑processors or support locations that can access customer data.
- Shifts in access models or privilege levels.
Here the risk is often regulatory as well as technical.
Contract, SLA and policy changes
- Different uptime or support commitments.
- Adjusted incident notification timelines.
- Updated data‑processing terms or security obligations.
If you miss these, you can easily end up over‑promising to customers compared to what your suppliers now commit to.
A simple, repeatable pattern works well:
- Capture: store the notice, release note or red‑lined contract.
- Assess: consider impacts on security, privacy, continuity and customer contracts.
- Decide: accept, accept with mitigations, negotiate changes or plan to move away.
- Update: adjust risk entries, runbooks, service descriptions and customer communications where needed.
In ISMS.online you can link each significant supplier change directly to the supplier record, affected risks, actions and evidence. That gives you a neat trail you can use in audits and customer conversations to show that you didn’t just receive change notices – you understood them and acted on them in a controlled way.
How often should MSPs review critical suppliers, and what does a convincing A.5.22 review look like?
ISO 27001 leaves the timetable to you, but A.5.22 expects supplier reviews to be risk‑based, repeatable and in step with how fast things are changing. For MSPs, that usually means more frequent and deeper reviews for Tier‑1 suppliers, with proportionate effort for lower tiers.
What review rhythm and content tends to stand up under scrutiny?
A pattern that works well for many MSPs is:
- Tier‑1 suppliers: at least an annual structured review, plus additional reviews after major incidents or changes.
- Tier‑2 suppliers: annual or biennial reviews, focused on service quality and basic assurance.
- Tier‑3 suppliers: reviewed on significant change or if they show up in incidents or risk discussions.
For a Tier‑1 review, a clear, repeatable agenda gives you both control and evidence:
- Latest ISO 27001 / SOC 2 reports, penetration‑test summaries or security statements.
- Any material scope changes or new findings since the last review.
- Uptime and SLA performance over the period.
- Significant incidents or near misses and how both you and the supplier responded.
- Patterns you see in your own ticketing and monitoring.
- Architecture, region, ownership or sub‑processor changes.
- Contract or SLA changes that might affect your customer promises.
- Whether your current risk rating for the supplier still feels right.
- What you need the supplier to fix or improve.
- What you will change in your own designs, documentation or contracts.
- Who owns each action and when you will check progress.
Capturing that review as concise minutes with evidence attached and actions tracked is usually more than enough to satisfy an ISO 27001 auditor and an enterprise customer procurement team.
ISMS.online helps you schedule reviews by tier, attach relevant evidence, record decisions and track actions in one place. Over time, those accumulated review records become a powerful way to demonstrate to auditors, customers and even cyber insurers that you treat supply‑chain risk as an ongoing discipline, not an annual fire drill.
How can an MSP make supplier oversight feel like normal operations instead of a compliance chore?
The MSPs who cope best with A.5.22 don’t spin up a separate “supplier governance project.” They weave supplier thinking into the processes their teams already trust – incident management, change control, service reviews and risk management – so compliance falls out of good operations rather than competing with it.
What does embedded supplier oversight look like day to day?
You can usually get good traction by threading suppliers through familiar routines:
- Tag incidents and problems that involve third‑party services.
- When a pattern emerges – repeat outages, chronic slowness, repeated workarounds – link it to the supplier record and revisit the associated risk and KPIs/KRIs.
This stops chronic supplier issues from hiding in individual tickets.
- Treat significant supplier changes as standard changes in your own system.
- Run them through impact assessment, approvals and communications alongside internal changes.
That ensures upstream changes are reflected in your own controls before customers feel the effects.
- Make supplier performance and risk a standing item in your service review agendas.
- Use the same metrics you hold in your ISMS to explain to customers and internal stakeholders what’s working, what’s changing and what you are doing about it.
Being transparent about upstream services often increases customer trust rather than undermining it.
- Link suppliers explicitly to the risks they influence.
- When there’s an incident, assurance finding or material change, use that as a trigger to review the linked risks and treatments.
Over time, this turns “supplier oversight” into a habit that runs quietly in the background, rather than a checklist you only touch before an audit.
ISMS.online is designed to support that embedded style: suppliers, risks, incidents, reviews and changes all live in the same environment, with workflows tuned to the way MSPs actually operate. That makes it easier for you to keep A.5.22 satisfied, while presenting your organisation as a provider that treats supply‑chain risk as part of professional service delivery – the kind of partner enterprise customers and regulators are actively looking for.








