ISO 27001 Clauses

ISO 27001 Clause 4.1 – Understanding The Organisation And Its Context

ISO 27001 Clause 4.2 – Understanding The Needs And Expectations of Interested Parties

ISO 27001 Clause 4.3 – Determining The Scope Of The Information Security Management System

ISO 27001 Clause 4.4 – Information Security Management System

ISO 27001 Clause 5.1 – Leadership and Commitment

ISO 27001 Clause 5.3 – Organisational Roles, Responsibilities and Authorities

ISO 27001 Clause 6.1.1 – Planning General

ISO 27001 Clause 6.1.2 – Information Security Risk Assessment

ISO 27001 Clause 6.1.3 – Information Security Risk Treatment

ISO 27001 Clause 6.2 – Information Security Objectives and Planning to Achieve Them

ISO 27001 Clause 6.3 – Planning Of Changes

ISO 27001 Clause 7.1 – Resources

ISO 27001 Clause 7.2 – Competence

ISO 27001 Clause 7.3 – Awareness

ISO 27001 Clause 7.4 – Communication

ISO 27001 Clause 7.5.1 – Documented Information

ISO 27001 Clause 7.5.2 – Creating and Updating Documented Information

ISO 27001 Clause 8.3 – Information Security Risk Treatment

ISO 27001 Clause 9.1 – Monitoring, Measurement, Analysis, Evaluation

ISO 27001 Clause 9.2 – Internal Audit

ISO 27001 Clause 9.3 – Management Review

ISO 27001 Clause 10.1 – Continual Improvement

ISO 27001 Clause 10.2 – Nonconformity and Corrective Action

ISO 27001 Organisation Controls

ISO 27001 Annex A 5.1: Policies for information security

ISO 27001 Annex A 5.2: Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3: Segregation of duties

ISO 27001 Annex A 5.4: Management responsibilities

ISO 27001 Annex A 5.5: Contact with authorities

ISO 27001 Annex A 5.6: Contact with special interest groups

ISO 27001 Annex A 5.7: Threat intelligence

ISO 27001 Annex A 5.8: Information security in project management

ISO 27001 Annex A 5.9: Inventory of information and other associated assets

ISO 27001 Annex A 5.10: Acceptable use of information and other associated assets

ISO 27001 Annex A 5.11: Return of assets

ISO 27001 Annex A 5.12: Classification of information

ISO 27001 Annex A 5.13: Labelling of information

ISO 27001 Annex A 5.14: Information transfer

ISO 27001 Annex A 5.15: Access control

ISO 27001 Annex A 5.16: Identity management

ISO 27001 Annex A 5.17: Authentication information

ISO 27001 Annex A 5.18: Access rights

ISO 27001 Annex A 5.19: Information security in supplier relationships

ISO 27001 Annex A 5.20: Addressing information security within supplier agreements

ISO 27001 Annex A 5.21: Managing information security in the ICT supply chain

ISO 27001 Annex A 5.22: Monitoring, review and change management of supplier services

ISO 27001 Annex A 5.23: Information security for use of cloud services

ISO 27001 Annex A 5.24: Information security incident management planning and preparation

ISO 27001 Annex A 5.25: Assessment and decision on information security events

ISO 27001 Annex A 5.26: Response to information security incidents

ISO 27001 Annex A 5.27: Learning from information security incidents

ISO 27001 Annex A 5.28: Collection of evidence

ISO 27001 Annex A 5.29: Information security during disruption

ISO 27001 Annex A 5.30: ICT readiness for business continuity

ISO 27001 Annex A 5.31: Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32: Intellectual property rights

ISO 27001 Annex A 5.33: Protection of records

ISO 27001 Annex A 5.34: Privacy and protection of PII

ISO 27001 Annex A 5.35: Independent review of information security

ISO 27001 Annex A 5.36: Compliance with policies and standards for information security

ISO 27001 Annex A 5.37: Documented operating procedures

Home / ISO 27001 Templates / ISO 27001 Supplier Register Explained + Template

ISO 27001 Supplier Register Explained + Template

Last updated Sep 25, 2025

Author: Stuart Barker | ISO 27001 Expert and Thought Leader

A supplier register is a record of all of your vendors, suppliers and third parties. It captures some key information about them and it is used to manage the information security risk that they pose to you.

What is it?

An ISO 27001 Supplier Register is basically a list you keep of all the companies and people you do business with who handle your sensitive data. It’s a simple way to stay organised and make sure you know who has access to your information. Think of it as a detailed contacts list specifically for your business partners.

Applicability to Small Businesses, Tech Startups, and AI Companies

This supplier register is useful for businesses of all sizes, including small businesses, tech startups, and AI companies.

  • Small Businesses: You probably use services like accounting software (think QuickBooks) or cloud storage (like Dropbox). You need to list these suppliers to keep track of your data.
  • Tech Startups: You rely on many third-party tools, like customer relationship management (CRM) software (Salesforce), hosting providers (AWS), or payment processors (Stripe). It’s super important to know how these companies are protecting your customers’ data.
  • AI Companies: You might use external data providers or cloud services to train your models. Your register would include these suppliers to ensure the data you’re using is handled securely and responsibly.

ISO 27001 Supplier Register Template

The ISO 27001:2022 Supplier Register Template that is pre built and ready to go and comes with a step by step guide on how to manage vendors and suppliers in an ISO 27001 compliant way.

ISO 27001 Third Party Supplier Register Template

Why you need it

You need it to show that you’re being responsible with your data. ISO 27001 is all about protecting information, and this register helps you prove to auditors and customers that you’re taking security seriously. It’s a key part of your risk management plan.

When you need it

You need to start this register as soon as you begin working with any external company that handles your data. You’ll need to keep it updated whenever you add or remove a supplier. It’s a living document!

Who needs it?

You need this if your company handles any kind of sensitive information. Whether you’re a big corporation or a small team, if you share data with other businesses, this register is a must.

Where you need it

This register should be part of your company’s information security management system (ISMS). You can keep it in a simple spreadsheet, a database, or even a dedicated software tool. The important thing is that it’s easily accessible to the people who need it.

How to write it

Start with a simple table. Include columns for:

  • Supplier Name: The name of the company.
  • Contact Person: Who you talk to there.
  • Description of Service: What they do for you.
  • Type of Data Shared: What kind of information you give them (e.g., customer names, financial data).
  • Security Controls: What security measures they have in place (e.g., certifications like ISO 27001).

How to Implement It

  1. Find all your suppliers: Make a list of every company you share data with.
  2. Gather the info: Fill out your register with the details for each supplier.
  3. Review regularly: Check your register at least once a year to make sure it’s up to date.

Examples of using it for small businesses

Imagine you run a small online shop. Your supplier register might include:

  • Stripe: For processing credit card payments. You share customer payment information.
  • Shopify: Your e-commerce platform. You share customer names, addresses, and order details.

Examples of using it for tech startups

Let’s say you’ve built a new app. Your register might have:

  • Amazon Web Services (AWS): Your cloud provider. You share all your app data.
  • Slack: Your team communication tool. You share internal company conversations and files.

Examples of using it for AI companies

If you’re developing an AI for medical images, your register could list:

  • External Data Provider: A company that gives you medical image data for training.
  • Google Cloud: Where you store and process all your training data.

How the ISO 27001 Toolkit Can Help

An ISO 27001 toolkit includes pre-made templates for a supplier register. It can save you time and make sure you’ve covered all the necessary information. It’s like having a helpful guide to walk you through the process.

ISO 27001 Toolkit

Information Security Standards That Need It

This supplier register is a key part of ISO 27001, which is an international standard for managing information security. Other standards that need it include:

  • GDPR (General Data Protection Regulation)
  • CCPA (California Consumer Privacy Act)
  • DORA (Digital Operational Resilience Act)
  • NIS2 (Network and Information Security (NIS) Directive) 
  • SOC 2 (Service Organisation Control 2)
  • NIST (National Institute of Standards and Technology) 
  • HIPAA (Health Insurance Portability and Accountability Act)

List of Relevant ISO 27001:2022 Controls

The ISO 27001:2022 standard has specific controls that relate to supplier management and the need for a supplier register. Some of the most important ones include:

ISO 27001 Supplier Register Example

The following is an example of an ISO 27001 supplier register used for ISO 27001 vendor assessment and ISO 27001 third party risk assessment.

ISO27001 Supplier Register Template PDF Example

ISO 27001 Supplier Register FAQ

  1. Do I have to list my coffee supplier? No, you only need to list suppliers who handle your sensitive data.
  2. What if a supplier doesn’t have a security certification? You should still list them and note their security measures, even if they’re not certified.
  3. How often should I update the register? At least once a year, or whenever you add or remove a supplier.
  4. Can I use a simple spreadsheet? Yes, a spreadsheet works perfectly well.
  5. Is this a legal requirement? It’s a requirement for ISO 27001 certification, and helps you meet legal duties like GDPR.
  6. Who is responsible for the register? A person or team within your company should be responsible for keeping it updated.
  7. What’s the biggest mistake people make with this? Not keeping it updated!
  8. Can I share a single register for multiple certifications? Yes, this register can help you meet requirements for other standards.
  9. What about freelancers? Yes, if they handle your data, you should include them.
  10. What is a “supplier”? Anyone outside your company who provides a service and handles your data.
  11. Do I need to audit my suppliers? ISO 27001 doesn’t require you to, but it’s good practice.
  12. Is this just for large companies? No, it’s for all sizes.
  13. What if my supplier is in a different country? You still need to list them and be aware of their data protection laws.
  14. Where can I find more info? Check the official ISO 27001 documentation or certified consultants.
  15. What’s the best tool to use? Whatever works for you – a spreadsheet, a simple database, or specialised software.

About the author

Stuart Barker is an information security practitioner of over 30 years. He holds an MSc in Software and Systems Security and an undergraduate degree in Software Engineering. He is an ISO 27001 expert and thought leader holding both ISO 27001 Lead Implementer and ISO 27001 Lead Auditor qualifications. In 2010 he started his first cyber security consulting business that he sold in 2018. He worked for over a decade for GE, leading a data governance team across Europe and since then has gone on to deliver hundreds of client engagements and audits.

He regularly mentors and trains professionals on information security and runs a successful ISO 27001 YouTube channel where he shows people how they can implement ISO 27001 themselves. He is passionate that knowledge should not be hoarded and brought to market the first of its kind online ISO 27001 store for all the tools and templates people need when they want to do it themselves.

In his personal life he is an active and a hobbyist kickboxer.

His specialisms are ISO 27001 and SOC 2 and his niche is start up and early stage business.