ISO 27001:2022 dedicates four Annex A controls specifically to supplier relationships — and the 2022 revision strengthened these requirements significantly. If you're pursuing certification or maintaining it, here's exactly what A.5.19 through A.5.22 requires, what auditors test for, and how to build a compliant programme without the overhead.
What changed in 2022
ISO 27001 was substantially updated in 2022 — the first major revision since 2013. The changes to supplier and third-party risk management were among the most significant. If you're working from templates, blog posts, or consultant guidance written before 2022, your supplier management programme may not satisfy the current standard.
| Area | ISO 27001:2013 (old) | ISO 27001:2022 (current) |
|---|---|---|
| Supplier controls | 2 controls (A.15.1, A.15.2) | 4 controls (A.5.19–A.5.22) |
| ICT supply chain | Not explicitly addressed | Dedicated control (A.5.21) — sub-processors in scope |
| Ongoing monitoring | Implied | Explicitly required with evidence (A.5.22) |
| Security in agreements | Addressed | Strengthened — explicit security requirements in contracts |
The four controls
ISO 27001:2022 Annex A groups supplier management under Theme 5 (Organisational controls). Here are the four specific controls, what they require, and what evidence an auditor will look for when testing each one.
You must define and implement processes for managing information security risk in your supplier relationships — including a supplier policy, a risk-based approach to supplier classification, and processes for onboarding and offboarding.
Supplier agreements must explicitly address information security requirements — not just commercial terms. This includes data protection obligations, security standards expected, breach notification requirements, and audit rights.
You must manage information security risks in your ICT supply chain — including the security practices of your ICT suppliers' own suppliers (sub-processors). This control is new in 2022 and catches many organisations unprepared.
Supplier performance and security must be monitored and reviewed regularly. You need evidence of ongoing monitoring — not just an initial assessment. Changes in supplier security posture must be detected and responded to.
These four controls work as a system: A.5.19 establishes your policy and process, A.5.20 ensures your contracts support your requirements, A.5.21 extends your visibility into the supply chain, and A.5.22 ensures the whole thing operates continuously rather than as a one-time exercise.
What auditors actually test
Understanding what an ISO 27001 auditor is actually looking for — as opposed to what the control says on paper — is the key to being genuinely prepared. Auditors assess both design (does your process make sense?) and operation (does evidence show it's actually working?). Here's how they approach each of the four supplier controls:
Auditors will ask to see your supplier management policy and will then test whether it's actually being followed. They'll review a sample of recently onboarded suppliers to check whether your policy's requirements were applied — risk classification, initial assessment, agreement review. A policy that says the right things but isn't evidenced in practice will result in a finding.
Auditors will sample your supplier agreements — particularly for critical suppliers — and check for specific security provisions. They're looking for data protection clauses, breach notification obligations, security standards (either requiring certification or specifying requirements), and your right to audit or receive assurance. Standard terms of service without specific security provisions rarely satisfy this control for critical suppliers.
This is the control that catches most organisations off guard, particularly at first certification. Auditors will ask how you manage the security of your ICT supply chain — meaning how you handle the fact that your cloud provider, your SaaS tools, and your data processors all have their own supply chains. You don't need to audit AWS's suppliers, but you need to demonstrate that you've considered ICT supply chain risk and have a proportionate approach to managing it — typically by reviewing your critical suppliers' sub-processor lists and their own certification status.
This is where most organisations with good initial assessments fall down in surveillance audits. An auditor will ask for evidence of supplier reviews conducted during the audit period — not policies about when reviews should happen. They want to see that monitoring is happening: that security incidents affecting your suppliers are being tracked, that certifications are being checked on renewal, that contract expiries are being managed. Without a system generating this evidence automatically, it’s very hard to demonstrate consistently.
Common audit failures
“We delayed our ISO 27001 certification by four months because of supplier management gaps. We had a policy but no evidence it was being followed. No dated assessments, two critical vendors without DPAs, and no monitoring records. Our auditor gave us a major nonconformity. It was entirely avoidable.”
What a compliant programme looks like
A compliant ISO 27001 supplier management programme doesn't need to be complex — it needs to be complete, documented, and operating consistently. Here's what that looks like across each of the four control areas:
Your starting point is a register of every supplier relationship within scope of your ISMS. This includes technology suppliers (cloud infrastructure, SaaS, software), professional services firms with access to your systems or data, contractors and consultants with system access, and any processors or sub-processors handling personal data. Each supplier should be classified by criticality — typically a simple Critical/High/Medium/Low framework — which then determines the depth of assessment and frequency of review applied. The classification also determines the level of security requirements you need in the supplier agreement.
For critical and high-risk suppliers, your agreements need to explicitly address: data protection and processing obligations (a DPA if they handle personal data), the security standards you expect them to maintain or certify against, their obligations to notify you of security incidents within a defined timeframe, your right to audit or receive third-party certification as assurance, and the consequences of security failures including liability provisions. Getting these provisions in place is a one-time effort per supplier and can often be achieved through a mutual security addendum rather than renegotiating the entire contract.
For your critical ICT suppliers — particularly cloud providers and SaaS platforms that handle your data — you should be reviewing their sub-processor or fourth-party disclosure lists and considering any material risk from concentration or geography. Most major cloud providers publish this information. The goal isn't exhaustive supply chain mapping, it's demonstrating that you've identified where your material ICT supply chain risks are and have a proportionate approach to managing them.
Monitoring needs to happen continuously and be evidenced. At minimum, this means: reviewing critical supplier security certifications at their annual renewal, tracking security incidents that affect your suppliers, monitoring for sanctions or ownership changes that might affect supplier risk, managing contract renewals and expiries, and conducting formal supplier reviews at least annually. Without a system that automates and timestamps this monitoring, generating audit evidence for a twelve-month surveillance period is an enormous manual effort.
How Vendorapp helps
Vendorapp maps directly onto the evidence requirements of A.5.19 through A.5.22. Every feature produces output that an auditor can review — and everything is timestamped, never deleted, and exportable in minutes.
Search 22M+ suppliers by name or URL. Add every supplier in your ISMS scope — cloud, SaaS, contractors, subprocessors — and classify each by risk level. Vendorapp's risk classification framework maps directly to what ISO 27001 auditors expect to see. Your register stays current automatically as suppliers are added, reviewed, and offboarded.
Upload supplier contracts and Vendorapp Intelligence extracts key terms automatically — contract type, value, expiry, renewal terms. Your DPAs, security addenda, and breach notification clauses are stored alongside each supplier profile. Auditors can see at a glance which suppliers have compliant agreements and which need attention — before the audit, not during it.
Vendorapp Intelligence runs security posture assessments on every supplier in your register, flagging areas of concern in their own security posture and surfacing their certification status. For your critical ICT suppliers, the inherent and residual risk scoring creates the documented, evidence-based assessment of supply chain risk that A.5.21 requires.
Continuous screening against OFAC, UN, EU, UK OFSI, and DFAT sanctions lists runs automatically on every supplier. Smart alerts notify you of security incidents, sanctions changes, certificate expiries, and contract renewals. Every alert, every check, and every review is timestamped and stored — giving you twelve months of monitoring evidence for your surveillance audit without any manual effort.
When your certification body asks for supplier management evidence, generate a complete report in three clicks. Vendorapp produces board-ready and auditor-ready outputs covering your full supplier register, risk assessments, monitoring history, contract status, and audit trail. Offboarded suppliers are preserved in your history — never deleted — satisfying the offboarding evidence requirement automatically.
Practical guide
If you're starting from scratch or significantly behind on your supplier management programme, here's a practical sequence that gets you to audit-ready efficiently.
Your supplier register should cover all suppliers within your ISMS scope — not every company your organisation pays money to. Start by asking: which suppliers have access to information assets within scope? Which process, store, or transmit data that’s within scope? Which provide services that, if disrupted, would affect your information security? These are your in-scope suppliers.
Pull together your list from the obvious sources: your procurement records, your cloud and SaaS subscriptions, your contractor agreements, your data processor register if you maintain one for GDPR purposes. Then do a more thorough sweep — check who has API credentials, who has access to your production environment, what’s integrated into your infrastructure. The long tail is where auditors find gaps.
For each supplier, assign a risk classification. A simple framework: Critical (has direct access to production systems or handles sensitive personal data at scale), High (has access to internal systems or handles personal data), Medium (has access to non-sensitive internal information), Low (provides a service with no direct system or data access). Apply proportionate controls to each tier.
For Critical and High suppliers, run a formal risk assessment: what data do they access? What's their security posture — do they hold SOC 2, ISO 27001, or equivalent? Have they had relevant security incidents? What's your concentration risk if this supplier failed or was compromised? Document the assessment with a date and your risk conclusion.
For each Critical and High supplier, review whether your agreement addresses information security. If it doesn't — or if you're relying on standard terms of service — prioritise getting a security addendum or DPA in place. For Medium suppliers, check at minimum whether there's a DPA if they handle personal data.
The difference between a one-time exercise and a compliant programme is ongoing monitoring. Set up a process — or better, a tool — that tracks contract expiries, security certifications renewals, sanctions status changes, and security incidents affecting your suppliers. This monitoring needs to generate evidence, not just happen in someone's head.
Common questions
All suppliers within your ISMS scope — meaning those with access to information assets, those processing data within scope, or those providing services that affect your information security. There's no minimum number, but gaps are a common audit finding. For a typical SaaS company of 50–200 people, a thorough register will usually have between 20 and 100 suppliers, depending on how many tools and services the business runs on. Auditors are experienced at identifying obvious omissions — your cloud provider, your source code repository, your payroll system — so the register needs to be genuinely complete.
The standard requires periodic reviews but doesn't prescribe a specific frequency. Most certification bodies and ISMS practitioners interpret this as: at least annual formal reviews for all in-scope suppliers, more frequent reviews (quarterly or on a risk-event basis) for critical suppliers, and immediate reviews when material changes occur — a supplier suffers a breach, changes ownership, comes under sanctions, or materially changes the service they provide. What matters is that your policy sets a clear frequency, and that evidence shows it's being followed.
Your cloud provider's certifications — SOC 2, ISO 27001, PCI DSS and so on — provide assurance about their own security. But A.5.21 requires you to consider your ICT supply chain more broadly: the fact that your cloud provider has sub-processors, that your SaaS tools run on infrastructure they don't own, and that concentration in a single cloud provider creates supply chain risk. Your cloud provider's compliance documentation is useful evidence, but it doesn't demonstrate that you've actively considered and managed your ICT supply chain risk — which is what A.5.21 requires you to show.
A major nonconformity means the control is absent or fundamentally broken — no supplier register at all, no evidence of any risk assessments, no security provisions in any critical supplier agreements. A major nonconformity prevents certification until it's resolved. A minor nonconformity means the control exists and is broadly working, but there are gaps or inconsistencies — a few suppliers missing from the register, one critical supplier without a DPA, monitoring records that are patchy. Minor nonconformities can be accepted with a corrective action plan. Most supplier management findings are minors, but the cumulative effect of multiple minors can be treated as a major at an auditor's discretion.
The transition deadline to ISO 27001:2022 was October 2025 — all certificates issued before that date needed to be transitioned or recertified to the 2022 standard. For supplier management specifically, the key gap is typically A.5.21 (ICT supply chain security), which didn't have a dedicated control in the 2013 standard. You'll also need to review whether your supplier management policy and processes address the expanded requirements of A.5.19 and the strengthened monitoring requirements of A.5.22. If you're planning a transitional audit, your certification body will specifically assess whether the new supplier controls are addressed.
Yes. Vendorapp generates exportable reports and maintains a complete, timestamped audit trail of all supplier assessments, monitoring activity, contract management, and changes. This output is designed to be used directly as evidence in ISO 27001 audits. Many teams share their Vendorapp reports with their certification body as evidence for A.5.19–A.5.22, and use Vendorapp's continuous monitoring records to demonstrate ongoing compliance with A.5.22 across the full surveillance period.
Free to start, audit-ready by default. Get your supplier management programme running before your next certification or surveillance audit — and keep it running without the manual overhead.
Start free — no card neededWe use cookies to analyze usage and enhance site navigation to give you the best experience.