Supplier Agreement

What is a Supplier Agreement?

Supplier Agreement is a legally binding contract embedding technical security requirements into third-party relationships to ensure supply chain integrity under ISO 27001. The provision of mandatory security clauses is the primary implementation requirement, delivering the business benefit of verified data protection and mitigated third-party risk.

What is a Supplier Agreement?

supplier agreement is a contract between a company and an external provider for goods or services. When these goods or services involve sensitive data or critical systems, the agreement must include specific clauses to ensure the supplier follows the same security standards as the company. This helps protect the company’s information from being compromised by a third party.

Examples

  • Cloud Service Provider (CSP): A company that uses a CSP to store customer data needs a supplier agreement that outlines how the CSP will secure that data, including encryption, access controls, and data backup procedures.
  • Managed IT Service Provider (MSP): When an MSP handles a company’s network, the agreement should specify security measures like regular vulnerability scans, patching schedules, and incident response protocols.
  • Marketing Agency: A marketing agency that gets access to a company’s customer list for an email campaign must have an agreement that details how they’ll protect that list and what they’ll do with it after the campaign ends.

Context

In the world of business, it’s common to work with other companies. This is called a supply chain.

Even if your company is very secure, a weak link in the supply chain can put your information at risk. A strong supplier agreement makes sure all your partners are also protecting your information. It’s a key part of managing risk and building trust with your customers.

How to implement Supplier Agreement

Implementing a robust supplier agreement framework is a fundamental requirement of ISO 27001:2022 Control 5.20. As a Lead Auditor, I recommend following this 10-step sequence to ensure third-party security requirements are formalised, citable, and enforceable, mitigating the risk of supply chain vulnerabilities and technical non-compliance.

1. Provision a Centralised Supplier Inventory

Audit the organisation’s Asset Register to identify every third-party vendor with access to sensitive information: This ensures that 100% of the supply chain is visible to the Information Security Management System (ISMS). Key requirements include:

  • Mapping data flows between internal systems and third-party SaaS or IaaS providers.
  • Identifying technical dependencies on legacy infrastructure and external support teams.
  • Categorising suppliers based on the criticality of the services they provide.

2. Formalise the Supplier Risk Categorisation

Provision a formal risk assessment for each supplier to determine the depth of security requirements needed in the agreement: This ensures that technical controls are proportionate to the risk level. Technical actions include:

  • Assigning a risk score based on the volume of PII or IP handled by the supplier.
  • Identifying “High-Risk” vendors that require annual technical audits.
  • Documenting the baseline security expectations for low-risk commodity services.

3. Define Technical Security Baselines

Formalise a mandatory set of technical security requirements that all suppliers must meet: This provides a technical benchmark for inclusion in the final contract. Necessary components include:

  • Enforcing AES-256 bit encryption for all data at rest and TLS 1.3 for data in transit.
  • Mandating Multi-Factor Authentication (MFA) for 100% of remote administrative access.
  • Requiring regular vulnerability scanning and penetration testing by independent third parties.

4. Provision Standard Information Security Clauses

Formalise a library of citable security clauses to be embedded within every supplier contract: This ensures legal and technical accountability for security breaches. Requirements involve:

  • Drafting clauses that mandate compliance with ISO 27001 or equivalent frameworks.
  • Defining the technical responsibility for system updates and patch management.
  • Ensuring all clauses are reviewed by legal counsel for jurisdictional accuracy.

5. Formalise the Right to Audit and ROE

Provision a formal “Right to Audit” clause that includes a defined Rules of Engagement (ROE) document: This allows the organisation to verify that the supplier’s technical controls are functioning as described. Technical actions include:

  • Defining the scope of technical inspections, including log reviews and site visits.
  • Specifying the notice period and communication channels for audit activities.
  • Reserving the right to use third-party specialist auditors for technical deep-dives.

6. Provision IAM Roles and Logical Access Controls

Formalise specific Identity and Access Management (IAM) roles for supplier personnel accessing organisational systems: This ensures the Principle of Least Privilege is enforced. Implementation steps involve:

  • Provisioning unique user IDs for every individual supplier representative.
  • Revoke access immediately via automated leaver workflows when the contract ends.
  • Auditing access logs weekly to identify anomalous behaviour or unauthorised access.

7. Formalise Data Handling and GDPR Compliance

Provision specific instructions for the handling, storage, and eventual destruction of organisational data: This ensures compliance with GDPR and other technical data protection laws. Requirements include:

  • Documenting the geographic location of all primary and backup data centres.
  • Mandating the use of secure, certified data destruction tools at the end of the contract.
  • Identifying specific PII handling procedures within the supplier’s technical workflow.

8. Provision Incident Notification Protocols

Formalise a mandatory incident reporting timeframe within the agreement, typically requiring notification within 24 to 72 hours: This ensures the organisation can meet its own regulatory breach notification obligations. Technical actions involve:

  • Defining what constitutes a “reportable event” based on system availability or data loss.
  • Linking the supplier’s incident response team to your internal SOC or IT team.
  • Establishing an emergency contact list for high-priority technical escalations.

9. Audit Supplier Compliance Periodically

Execute regular technical reviews of the supplier’s security performance against the agreed benchmarks: This provides objective evidence of supply chain resilience for UKAS auditors. Necessary actions include:

  • Collecting and reviewing SOC2 reports or ISO 27001 certificates annually.
  • Conducting desktop audits of security policy implementation.
  • Updating the Risk Register based on any discovered technical deficiencies.

10. Revoke Assets and Access at Termination

Audit the termination process to ensure that 100% of logical access is revoked and all physical assets are returned: This closes the security loop and prevents “Shadow IT” risks. Implementation involves:

  • Revoke VPN and SaaS access codes immediately upon contract cessation.
  • Verifying the return of laptops, encrypted tokens, and facility access cards.
  • Documenting the final exit review and data destruction certificates.

Supplier Agreement FAQ

What is an ISO 27001 supplier agreement?

An ISO 27001 supplier agreement is a formalised contract that embeds specific information security requirements into third-party relationships. Under ISO 27001:2022 Control 5.20, 100% of suppliers with access to organisational assets must agree to documented security terms to mitigate supply chain risks and ensure consistent data protection across the technical estate.

What are the mandatory security clauses for supplier agreements?

Mandatory security clauses ensure that vendors adhere to the same technical standards as the primary organisation. To satisfy UKAS auditor requirements, agreements should include the following technical benchmarks:

  • Right to Audit: A citable clause allowing technical inspections of the supplier’s security environment.
  • Incident Notification: A requirement to report security breaches within a 24 to 72-hour window.
  • Data Protection: Explicit mandates for AES-256 encryption at rest and TLS 1.3 for data in transit.
  • Access Revocation: Procedures for the 100% removal of logical access upon contract termination.

How does ISO 27001:2022 Control 5.20 change supplier requirements?

Control 5.20 in the 2022 revision consolidates requirements to focus on the entire supplier lifecycle, from onboarding to exit. It requires organisations to maintain 100% visibility of their supply chain through a centralised inventory and implement risk-proportionate controls, replacing the more fragmented approach found in the previous 2013 version.

How often should supplier security performance be audited?

Organisations should audit high-risk suppliers at least once every 12 months to verify technical compliance. For critical infrastructure or cloud providers, citable evidence such as SOC2 reports or ISO 27001 certificates should be reviewed annually to maintain a 100% assurance level within the ISMS framework.

Relevant ISO 27001 Controls

The following controls from the ISO/IEC 27001:2022 standard are related to supplier agreements:

Stuart and Fay High Table

About the author

Stuart Barker
🎓 MSc Security 🛡️ Lead Auditor 30+ Years Exp 🏢 Ex-GE Leader

Stuart Barker

ISO 27001 Ninja

Stuart Barker is a veteran practitioner with over 30 years of experience in systems security and risk management. Holding an MSc in Software and Systems Security, he combines academic rigor with extensive operational experience, including a decade leading Data Governance for General Electric (GE).

As a qualified ISO 27001 Lead Auditor, Stuart possesses distinct insight into the specific evidence standards required by certification bodies. His toolkits represent an auditor-verified methodology designed to minimise operational friction while guaranteeing compliance.

Shopping Basket
Scroll to Top