ISO 27001:2022 Annex A 5.5 Contact with authorities

ISO 27001 Annex A 5.5 Contact with authorities

In this guide, I will show you exactly how to implement ISO 27001 Annex A 5.5 and ensure you pass your audit. You will get a complete walkthrough of the control, practical implementation examples, and access to the ISO 27001 templates and toolkit that make compliance easy.

I am Stuart Barker, an ISO 27001 Lead Auditor with over 30 years of experience conducting hundreds of audits. I will cut through the jargon to show you exactly what changed in the 2022 update and provide you with plain-English advice to get you certified.

Key Takeaways: ISO 27001 Annex A 5.5 Contact with Authorities

ISO 27001 Annex A 5.5 requires organizations to establish and maintain contact with relevant authorities to ensure the appropriate flow of information regarding security incidents, regulatory requirements, and legal obligations. While it may seem like “stating the obvious,” this control is a foundational part of governance. It ensures that when a crisis hits, like a major data breach or a physical fire, your team knows exactly who to call, how to report the issue, and what the legal timelines for notification are.

Core requirements for compliance include:

  • Identification of Authorities: You must list all regulatory, legal, and supervisory bodies relevant to your business. This includes data protection regulators (like the ICO in the UK), law enforcement, and utility providers.
  • Defined Reporting Processes: You must document how and when these authorities should be contacted. For example, GDPR requires notifying the regulator within 72 hours of a personal data breach.
  • Incident Response Integration: Your contact list must be accessible to your incident management and business continuity teams so they can act immediately during an event.
  • Regulatory Registration: You must prove that you have registered with mandatory authorities. A common audit failure is forgetting to register as a data controller with your local data protection registrar.
  • Continuous Maintenance: The contact list must be reviewed and updated at least annually to ensure the details (phone numbers, web portals, names) remain accurate.

Audit Focus: Auditors will look for “The Emergency Dial”:

  1. The List: “Show me your documented list of relevant authorities. Why have you included (or excluded) the local cybercrime unit?”
  2. Legal Registration: “Show me your current registration certificate with the Information Commissioner’s Office (or local equivalent).”
  3. Process Awareness: “If you suffered a ransomware attack at 2 AM on a Sunday, how does your incident responder find the contact details for your cyber insurance and law enforcement?”

Authority Contact Matrix (Audit Prep):

Authority TypeExample EntityCritical Reason to Contact
Data PrivacyICO (UK) / DPC (IE).Mandatory Personal Data Breach Reporting (GDPR).
Law EnforcementLocal Police / Cyber Unit.Theft of hardware, Fraud, or Ransomware attacks.
UtilitiesISP / Power Provider.Connectivity or power outages affecting “Availability.”
EmergencyFire / Health & Safety.Physical facility incidents (e.g., Server Room fire).
FinancialFCA / SEC / SEC.Compliance or regulatory breaches (if applicable).

Key Takeaways

  • ISO 27001 Annex A 5.5 requires organisations to establish and maintain easy contact with authorities for information security matters.
  • Businesses must identify and list all relevant authorities, such as regulators and law enforcement, and create a clear process for communication.
  • Having a documented list of contacts and communication procedures is crucial for demonstrating compliance and passing a security audit.

What is ISO 27001 Annex A 5.5?

ISO 27001 Annex A 5.5 Contact with Authorities is an ISO 27001 control that requires an organisation to establish and maintain contact with authorities that are relevant to them.

ISO 27001 contact with authorities is the requirement that organisations need to maintain contact with relevant authorities regarding security incidents, complaints, and vulnerabilities.

ISO 27001 Annex A 5.5 Purpose

The purpose of ISO 27001 Annex A 5.5 is to ensure the appropriate flow of information takes place with respect to information security between the organisation and relevant legal, regulatory and supervisory authorities.

ISO 27001 Annex A 5.5 Definition

ISO 27001 defines ISO 27001 Annex A 5.5 as

The organisation should establish and maintain contact with relevant authorities.

ISO 27001 Annex A 5.5 Contact with Authorities

Watch the ISO 27001 Annex A 5.5 Tutorial

In the video ISO 27001 Annex A 5.5 Contact With Authorities Explained I show you how to implement it and how to pass the audit.

ISO 27001 Annex A 5.5 Podcast

In this episode: Lead Auditor Stuart Barker and team do a deep dive into the ISO 27001 Annex A 5.5 Contact With Authorities. The podcast explores what it is, why it is important and the path to compliance.

ISO 27001 Annex A 5.5 Implementation Guidance

You are going to have to ensure that:

  • you identify and document what authorities apply to you
  • in what circumstances you would contact them
  • how information security incidents should be reported if relevant
  • understand what expectations these authorities have, if any
  • include relevant contact steps in your incident management processes
  • include relevant contact steps in your business continuity plan and disaster recovery processes

People often scratch their heads at this one but an easy win is the contact with your data protection regulator that is likely mandated in law. In addition you can consider the likes of utility companies for power and water, health and safety if relevant, fire departments for business continuity and incident management, perhaps your telecoms provider for routing if lines go down.

How to identify the authorities you need to contact

You are going to identify the authorities that you might need to make contact with. If you are in a regulated industry that may be relatively straightforward as there may be regulatory bodies that you might need to make contact with. 

If you’re within the European union and GDPR applies to you then you may need to  register with your local data protection authority, for example in the UK you have to register with the Information Commissioner’s Office.

The next on the list, is going to be things like the support utilities such as water and power. These are usually things that you’ve identified as part of your Business Continuity management process  or you’ve identified as part of your Incident Management process.

Finally, you’ve law enforcement agencies.

How to contact authorities

When it comes to how you’re going to contact them you’re just going to follow whatever process they’ve got. To document that you record their contact process.

It is unlikely for the majority of organisations that you have a special one to one relationship where you have your own bespoke process but in terms of the requirement of the standard you’re going to identify those authorities that you need to make contact with and how you contact them.

How to document contact with authorities

You’re going to list out the authorities that you may need to contact and record their contact details. You may record that how you contact them is via the processes that they have in place. This will be available to your incident management process and part of that process.

Examples of authorities to contact

Examples of authorities that you may need to contact

  • Data protection regulator
  • Industry Regulatory Bodies
  • Government Agencies
  • Law Enforcement Agencies
  • Power Companies
  • Telecoms Companies
  • Utility Companies
  • Emergency Services

How to implement ISO 27001 Annex A 5.5

Implementing ISO 27001 Annex A 5.5 requires more than a simple list of phone numbers. It demands a formalised governance framework that ensures your organisation can interact with regulatory and legal bodies without delay during a security crisis. By establishing pre-defined communication channels and notification thresholds, you reduce legal exposure and ensure compliance with statutory reporting obligations such as the UK GDPR or sector-specific regulations. This action-focused guide outlines the technical and procedural steps required to satisfy auditor requirements for the 2022 standard.

1. Inventory Statutory and Regulatory Authorities

Identify all legal, regulatory, and supervisory bodies relevant to your jurisdiction and industry sector. This action results in a comprehensive scope of all external entities that may require notification during an information security incident or for regular compliance reporting.

  • Identify data protection regulators such as the Information Commissioner Office (ICO) for UK operations.
  • Map sector-specific bodies such as the Financial Conduct Authority (FCA) or the National Cyber Security Centre (NCSC).
  • Document law enforcement contacts for cybercrime reporting, including local specialist units and national agencies like Action Fraud.
  • Review contractual obligations with clients that may mandate specific third-party notification protocols.

2. Formalise Communication Thresholds and Procedures

Establish clear criteria for when and why each authority must be contacted. This result-focused step prevents both under-reporting, which carries legal risk, and over-reporting, which can lead to unnecessary regulatory scrutiny.

  • Define notification triggers based on the severity and type of data breach (e.g. personal data loss versus system downtime).
  • Align reporting timelines with statutory requirements, such as the 72-hour window mandated by the GDPR.
  • Document the “Rules of Engagement” (ROE) for interacting with law enforcement to protect digital evidence integrity.
  • Integrate these thresholds directly into your primary Incident Response Plan (IRP).

3. Assign Designated Liaison Roles

Provision specific accountability by naming individuals authorised to communicate with authorities on behalf of the organisation. This action prevents conflicting messages and ensures that all outgoing information is vetted by legal or senior management.

  • Assign the Chief Information Security Officer (CISO) or Data Protection Officer (DPO) as the primary point of contact.
  • Define deputy roles to ensure continuity of communication during a prolonged incident or staff absence.
  • Specify the IAM roles and portal access permissions required for submitting official regulatory filings.
  • Establish a formalised internal approval workflow for all official statements before they are transmitted to external bodies.

4. Provision an Authorities Contact Register

Create a centralised and secure register containing validated contact information for all identified authorities. This action results in a single source of truth that allows the incident response team to act immediately when a reporting threshold is triggered.

  • Include direct telephone numbers, emergency out-of-hours contacts, and official reporting portal URLs.
  • Document specific reference numbers or account IDs required to identify your organisation to the regulator.
  • Ensure the register is stored in a location accessible even during a total network outage, such as a physical backup or an offline encrypted drive.
  • Cross-reference the register with your Business Continuity Plan (BCP) for high-availability access.

5. Execute Tabletop Exercises and Validation

Perform periodic simulations to test the effectiveness of your authority contact procedures. This result-orientated step provides the evidence needed for ISO 27001 audits and ensures that your team is prepared for real-world scenarios.

  • Incorporate authority notification steps into quarterly incident response tabletop exercises.
  • Verify the accuracy of contact details in the register every six months and update the audit trail accordingly.
  • Review the results of tests to identify gaps in communication or delays in the internal approval process.
  • Maintain a log of all simulated and actual contacts with authorities as mandatory audit evidence.

Contact List Example Table

Type Authority Name Reason to Contact ISO 27001:2022 Control
Data Privacy ICO (UK) / DPC (IE) Data Breach (GDPR Reporting). Annex A 5.5 / 5.34
Law Enforcement Local Police / Cyber Crime Unit Theft, Fraud, Ransomware. Annex A 5.5
Utilities Power / Water Provider Service Outage (Business Continuity). Annex A 5.5 / 5.30
Emergency Fire Service Physical site fire. Annex A 5.5 / 7.1
Financial FCA / SEC Compliance breach (if regulated). Annex A 5.5 / 5.36

How to comply

To comply with ISO 27001 Annex A 5.5 you are going to implement the ‘how’ to the ‘what’ the control is expecting. In short measure you are going to

  • List the relevant authorities and document your who, how and when you will contact authorities

How to pass the ISO 27001 Annex A 5.5 audit

To pass an audit of ISO 27001 Annex A 5.5 Contact with Authorities you are going to make sure have listed and document the authorities that you contact and show evidence that you contacted them.

What an auditor looks for

The audit is going to check a number of areas for compliance with ISO 27001 Annex A 5.5 Contact with Authorities. Lets go through them:

1. That you have a list of authorities you would contact

What this means is that you need to show that you have a list of authorities that you have considered and are in scope for you.

2. That you have a process to contact them

The process may be straightforward. Many authorities have pre defined ways in which you contact them. Just write them down.

3. That you have contacted authorities

There is not an expectation that you have contacted everyone on your list. It just wont be relevant. But some of those contacts will be mandated in law or regulation, and for those, you should have evidence the contact took place. A simple example would be registering with the data protection supervisory body.

Top 3 ISO 27001 Annex A 5.5 Mistakes and How to Fix Them

In my experience, the top 3 mistakes people make for ISO 27001 Annex A 5.5 Contact with Authorities are:

1. You didn’t register with the Data Protection registrar

Often a legal requirement, make sure you have registered as a data controller or data processor, which ever applies, with the relevant bodies. They will check.

2. You don’t have a list of relevant authorities

You thought it was obvious so didn’t write it down. Wrong. Write it down to show you considered it.

3. Your document and version control is wrong

Keeping your document version control up to date, making sure that version numbers match where used, having a review evidenced in the last 12 months, having documents that have no comments in are all good practices.

Applicability of ISO 27001 Annex A 5.5 across different business models.

Business Type Applicability & Interpretation Examples of Control
Small Businesses

Emergency Contacts & Regulators. You don’t need a complex legal team. Compliance means having a simple “Emergency Contact List” that includes your data protection regulator (ICO) and non-emergency police numbers.

ICO Registration: Ensuring you have paid your data protection fee and have the ICO helpline saved for breach reporting.
Utility Contacts: Knowing who to call if your office internet (ISP) or power goes down, as this affects “Availability.”

Tech Startups

Breach Reporting (72 Hours). Startups handling user data must know exactly who to call when a breach happens to meet the 72-hour GDPR window. Panic leads to fines; preparation leads to compliance.

Incident Playbook: A pre-written script for contacting the regulator (e.g., “We have detected a breach…”) integrated into your Incident Response Plan.
Cyber Insurance: Keeping your insurer’s emergency hotline in your contact list, as they often provide legal counsel during a breach.

AI Companies

AI Safety & Emerging Regulation. As AI regulation tightens (e.g., EU AI Act), you must maintain contact with new oversight bodies regarding model safety and high-risk classifications.

AI Safety Institute: Registering or maintaining contact with national AI safety bodies (UK/US) if developing frontier models.
Copyright & IP Bodies: Maintaining contacts for Intellectual Property offices if your model training involves complex copyright licensing disputes.

Applicability of ISO 27001 Annex A 5.5 across different business models.

Fast Track ISO 27001 Annex A 5.5 Compliance with the ISO 27001 Toolkit

For ISO 27001 Annex A 5.5 (Contact with authorities), the requirement is to establish and maintain contact with relevant authorities, such as law enforcement, regulators, and utility companies. This ensures that in the event of an incident, the right information flows to the right legal and supervisory bodies.

Compliance Factor SaaS Compliance Platforms High Table ISO 27001 Toolkit Audit Evidence Example
Policy Ownership Rents access to your legal response plan; if you cancel the subscription, your documented regulatory history and contact logs vanish. Permanent Assets: Fully editable Word/Excel Authority Contact Lists and Incident Management templates you own forever. A localized “Contact with Authorities List” stored on your secure drive containing ICO registration and local police details.
Operational Utility Attempts to “automate” contact management via dashboards that cannot verify regulator registration or identify local police jurisdictions. Governance-First: Provides a “Contact List Example Table” to formalize your existing escalation and emergency relationships. A “Data Protection Certificate” or regulatory registration number integrated into your formal compliance documentation.
Cost Efficiency Charges a “Regulatory Tax” based on integrated frameworks or contacts, creating perpetual overhead for static legal information. One-Off Fee: A single payment covers your authority governance whether you track 5 regulatory bodies or 50. Allocating budget to actual security improvements or legal counsel rather than monthly “dashboard” subscription fees.
Strategic Freedom Mandates rigid reporting formats that often fail to align with lean office setups or specialized industry environments. 100% Agnostic: Procedures adapt to your operating style—from dedicated legal teams to simple internal escalation lists. The ability to evolve your legal communication strategy and regulatory footprint without reconfiguring a rigid SaaS module.

Summary: For Annex A 5.5, the auditor wants to see that you have a formal list of relevant authorities and proof of registration (like a Data Protection Certificate). The High Table ISO 27001 Toolkit provides the governance framework to satisfy this requirement immediately. It is the most direct, cost-effective way to achieve compliance using permanent documentation that you own and control.

ISO 27001 Annex A 5.5 FAQ

What is ISO 27001 Annex A 5.5?

ISO 27001 Annex A 5.5 is an organisational control that requires an organisation to establish and maintain appropriate contacts with relevant legal, regulatory, and supervisory authorities.

  • Ensures the organisation knows exactly who to contact during a security incident.
  • Mandates that contact procedures are formalised and kept up to date.
  • Facilitates compliance with statutory requirements for breach reporting.
  • Supports proactive situational awareness of the legal and regulatory landscape.

Which authorities should be included in the contact list?

The specific authorities required depend on your industry and location, but typically include law enforcement, data protection regulators, and sector-specific oversight bodies.

  • Law enforcement agencies (e.g., Action Fraud or the National Cyber Security Centre in the UK).
  • Data protection authorities (e.g., the Information Commissioner’s Office – ICO).
  • Regulatory bodies (e.g., the Financial Conduct Authority – FCA).
  • Emergency services and local government resilience forums.

Is it mandatory to contact authorities for every incident?

No, you only need to contact authorities when an incident meets specific legal, regulatory, or contractual thresholds defined in your incident response plan.

  • Mandatory for personal data breaches that risk individuals’ rights (GDPR).
  • Required if the incident involves criminal activity or cyber-extortion.
  • Necessary if specific service level agreements (SLAs) with government bodies are breached.
  • Consult your internal risk assessment to determine the appropriate escalation path.

What is the difference between Annex A 5.5 and 5.6?

The primary difference is that Annex A 5.5 focuses on legal and regulatory authorities, while Annex A 5.6 focuses on peer groups, security forums, and special interest groups.

  • Annex A 5.5 is for compliance, reporting, and official oversight.
  • Annex A 5.6 is for knowledge sharing, best practices, and threat intelligence.
  • Authorities (5.5) have the power to penalise; Special Interest Groups (5.6) are for collaborative support.

How do you evidence Annex A 5.5 compliance for an auditor?

Auditors look for a documented list of contacts and verifiable evidence that these contacts are reviewed and tested as part of your incident response procedures.

  • A formal “Authorities Contact List” included within your ISMS documentation.
  • Evidence of periodic reviews (usually annual) to ensure contact details are accurate.
  • Logs or minutes from incident response tabletop exercises involving authority notification.
  • Documentation of any actual correspondence or reporting made to authorities.

When must you notify the ICO under ISO 27001?

Under ISO 27001 and the UK GDPR, you must notify the ICO within 72 hours of becoming aware of a personal data breach that is likely to result in a risk to individuals.

  • Notification is required if the breach leads to accidental or unlawful destruction, loss, or disclosure of PII.
  • Reporting is mandatory if the data breach involves sensitive “special category” data.
  • Initial notification can be made even if the full extent of the breach is not yet known.

ISO 27001 Clause 5.3 Organisational Roles, Responsibilities and Authorities

Further Reading

How to Implement ISO 27001:2022 Annex A 5.5: Contact with Authorities

How to Audit ISO 27001:2022 Annex A 5.5: Contact with Authorities

ISO 27001:2022 Annex A 5.5 for Small Business: Your Emergency Contact List

ISO 27001:2022 Annex A 5.5 for AI Companies: Navigating the Regulatory Web

ISO 27001:2022 Annex A 5.5 for Tech Startups: Who You Gonna Call?

ISO 27001 Controls and Attribute Values

Control typeInformation
security properties
Cybersecurity
concepts
Operational
capabilities
Security domains
PreventiveConfidentialityIdentifyGovernanceDefence
CorrectiveIntegrityProtectResilience
AvailabilityRespond
Recover
Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor ⚡ 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top