ISO 27001:2022 Annex A 5.19 – Information Security in Supplier Relationships Explained

Your security posture is only as strong as the weakest supplier relationship.

Annex A 5.19 exists to ensure organisations identify, assess, and manage information security risks arising from suppliers, rather than assuming those risks are transferred or reduced by contract alone.

This control recognises a simple reality: suppliers routinely access, process, store, or impact information and systems that matter.

ISO 27001

Quick Guide: Annex A 5.19 at a Glance

Annex A 5.19 of ISO 27001:2022 focuses on information security in supplier relationships.

At a practical level, this means:

  • Identifying suppliers that can affect information security
  • Understanding and managing supplier-related security risks
  • Applying controls proportionate to supplier risk and criticality
  • Defining security expectations for suppliers
  • Managing supplier relationships throughout their lifecycle

The control does not require identical treatment for all suppliers. It expects a risk-based, segmented approach that reflects the nature and importance of each relationship.

In-Depth Guide to Annex A 5.19

What Is Annex A 5.19 and Why Does It Matter?

Suppliers are used because:

  • Certain services are not delivered internally
  • External providers offer scale, capability, or cost advantages

However, supplier relationships also introduce risk, including:

  • Loss of control over information
  • Dependency on external systems
  • Exposure to supplier security weaknesses
  • Reduced visibility during incidents

Annex A 5.19 ensures these risks are ** recognised and managed deliberately, rather than discovered during an incident or audit.

This control applies broadly, including:

  • Technology and cloud providers
  • Professional services
  • Outsourced operations
  • Utilities, logistics, and infrastructure services

If a supplier can affect your information, they fall within scope.

How to Implement Annex A 5.19 Effectively

A pragmatic approach to Annex A 5.19 typically includes the following elements.

1. Identify and Categorise Suppliers

Not all suppliers present the same level of risk.

Organisations often:

  • Maintain a record of suppliers that affect information security
  • Categorise suppliers by type, access, and criticality
  • Focus effort where risk and impact are highest

Segmentation supports proportional control.

2. Assess Supplier-Related Information Security Risk

Supplier risk should be understood before and during the relationship.

This may involve considering:

  • Access to information or systems
  • Sensitivity of information involved
  • Dependency on supplier availability
  • Supplier security maturity

Risk assessment should inform how the relationship is governed.

3. Define Information Security Expectations

Organisations should define what they expect from suppliers in relation to information security.

This often includes:

  • Acceptable use and handling of information
  • Access and authentication expectations
  • Incident notification and cooperation
  • Protection of confidentiality, integrity, and availability

Expectations should be clear and realistic.

4. Integrate Security Into Supplier Management

Information security should be part of normal supplier management, not a one-off activity.

This may include:

  • Ongoing monitoring or review
  • Periodic reassessment of risk
  • Reviewing incidents and issues
  • Managing changes to scope or access

Security requirements should evolve with the relationship.

5. Manage Information Security at the End of the Relationship

Supplier relationships introduce risk at exit as well as onboarding.

Organisations typically consider:

  • Removal of access rights
  • Return or deletion of information
  • Asset recovery
  • Confirmation of contractual obligations

Exit should be managed deliberately to avoid residual exposure.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Common Challenges and How to Overcome Them

  • Treating all suppliers the same
  • Segment suppliers based on risk and criticality
  • Assuming contracts alone manage security risk
  • Support contracts with practical controls and oversight
  • Focusing only on onboarding
  • Manage security throughout the supplier lifecycle
  • Poor visibility of supplier access and dependencies
  • Maintain awareness of how suppliers interact with assets

Supplier risk increases when relationships are unmanaged or assumed to be static.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 5.19 is about maintaining control when control is shared.

When supplier relationships are managed effectively:

  • Information security risks are understood and reduced
  • Accountability is clearer
  • Incidents are handled more effectively
  • Trust is based on visibility, not assumption

Suppliers extend your operational capability. Annex A 5.19 ensures they do not unintentionally extend your risk.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls