How to Implement ISO 27001 Annex A 5.21

Implementing ISO 27001 Annex A 5.21 is the systematic process of securing information technology assets throughout their lifecycle. The primary implementation requirement centers on physical hardware inspection and firmware hash verification, delivering the business benefit of preventing supply chain compromises and ensuring high-integrity ICT infrastructure operations.

ISO 27001 Annex A 5.21 Managing Information Security in the ICT Supply Chain Implementation Checklist

Use this implementation checklist to achieve compliance with ISO 27001 Annex A 5.21. Real-world security is verified through physical hardware inspection and hardened configuration files, not by clicking “accept” on a vendor’s digital questionnaire.

1. Define the ICT Supply Chain Scope

Control Requirement: Identify and document all ICT products and services that impact the organisation’s security posture.

Required Implementation Step: Create a manual inventory of every hardware provider, software developer, and cloud service. Do not rely on “automated discovery” tools; walk through the server room and check the asset tags on switches, firewalls, and storage arrays to ensure every manufacturer is listed.

Minimum Requirement: A spreadsheet or internal database listing every ICT vendor and the specific component they provide.

2. Categorise Critical ICT Components

Control Requirement: Assess the criticality of ICT components based on their impact on confidentiality, integrity, and availability.

Required Implementation Step: Assign a risk level to each item in your inventory. Focus on “Single Points of Failure” (SPOF) where a vendor’s compromise would result in an immediate total system outage, such as your core router or identity provider.

Minimum Requirement: A documented risk assessment for all hardware and software that handles production data.

3. Implement Physical Hardware Chain of Custody

Control Requirement: Ensure ICT products are protected against tampering during transit and delivery.

Required Implementation Step: Establish a formal “Goods In” procedure. When a new server or network device arrives, an engineer must physically inspect the anti-tamper seals and photograph the serial numbers before the device is allowed into the secure zone.

Minimum Requirement: A signed log entry for every hardware delivery confirming the integrity of physical packaging.

4. Perform Binary and Firmware Hash Verification

Control Requirement: Verify the integrity of software and firmware updates before installation.

Required Implementation Step: Before applying any update, manually download the vendor’s provided SHA-256 hash. Run a checksum on the downloaded file in your local terminal to ensure the binary has not been intercepted or modified by a malicious middleman.

Minimum Requirement: Documentation in the Change Management log showing the verified hash for critical firmware updates.

5. Enforce Hardened Remote Support Access

Control Requirement: Control and monitor vendor access to internal ICT systems for support purposes.

Required Implementation Step: Disable all vendor VPNs by default in the firewall. Only enable access during an approved support window and ensure the vendor’s session is recorded via a terminal proxy or screen recording tool that you control locally.

Minimum Requirement: Firewall rules set to “Deny” for vendor access, requiring manual intervention for activation.

6. Verify Sub-Supplier (Fourth-Party) Disclosures

Control Requirement: Require ICT suppliers to disclose their own sub-contractors and monitor the risks involved.

Required Implementation Step: Demand a “Bill of Materials” (BOM) from your software vendors. You need to know which third-party libraries and data centres they are using, and you must document these dependencies in your internal risk register.

Minimum Requirement: A list of critical sub-processors for your top 5 most important ICT vendors.

7. Define Explicit Security Requirements in RFPs

Control Requirement: Incorporate information security requirements into the procurement process for ICT products.

Required Implementation Step: Add a mandatory “Security Appendix” to all Request for Proposals. Require vendors to prove they use Secure Development Lifecycle (SDLC) practices and provide evidence of independent penetration tests for their specific product version.

Minimum Requirement: A standard procurement template that includes mandatory security non-negotiables.

8. Implement Hardware Lifecycle and Disposal Logs

Control Requirement: Manage the security risks associated with the decommissioning and disposal of ICT equipment.

Required Implementation Step: When a disk or device reaches end-of-life, do not just put it in a bin. Record the serial number, physically shred the storage media on-site or through a certified provider, and keep the “Certificate of Destruction” in your local physical file.

Minimum Requirement: A disposal log cross-referenced with your asset inventory and certificates of destruction.

9. Mandate Vulnerability Disclosure Deadlines

Control Requirement: Ensure ICT suppliers notify the organisation of discovered vulnerabilities in their products.

Required Implementation Step: Update your contracts to include a “Critical Vulnerability Clause.” This must legally require the vendor to notify you within 24 hours of discovering a zero-day or high-severity vulnerability that affects your specific deployment.

Minimum Requirement: Contractual language specifying a maximum notification window for security defects.

10. Conduct Annual Physical Evidence Audits

Control Requirement: Regularly monitor and review ICT supply chain security performance.

Required Implementation Step: Once a year, pick a random ICT vendor and perform a “deep dive.” Ask for their latest SOC2 Type II report, but then manually verify that their physical security controls—like data centre access logs—actually match their claims.

Minimum Requirement: An annual audit report signed by the CISO covering ICT supply chain compliance.

ISO 27001 Annex A 5.21 SaaS / GRC Platform Implementation Failure Checklist

Evidence of how automated GRC platforms fail to secure the ICT supply chain versus manual technical verification.
Control Requirement The ‘Checkbox Compliance’ Trap The Reality Check
Hardware Integrity SaaS tool asks vendor: “Is your hardware secure?” Hardware is tampered with in transit; only physical seal inspection at your dock catches it.
Firmware Security Tool checks if a vendor has an ISO certificate. ISO certificates don’t stop backdoored firmware; manual hash verification does.
Remote Support Platform stores a PDF of the vendor’s access policy. Policies don’t stop hackers; firewall rules and session recording in your DMZ do.
Supply Chain Transparency Tool scrapes the vendor’s website for logos. Websites lie; you must demand a full Software Bill of Materials (SBOM) to see hidden vulnerabilities.
Component Criticality Dashboard assigns “Low Risk” to all SaaS apps. A “Low Risk” API used for auth is actually a total system SPOF that requires manual hardening.
Vulnerability Management Automated tool scans for generic CVEs. Generic scans miss proprietary hardware bugs; you need direct vendor alerts for your specific models.
Asset Disposal SaaS sets a reminder to “Dispose of Asset.” A reminder isn’t evidence; an auditor needs a physical destruction certificate with a matching serial number.
Audit Rights Platform marks “Complete” when a SOC2 is uploaded. SOC2 reports are often 6 months old; real compliance requires checking current server config files.

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top