Table of contents
- ISO 27001 Supplier Register
- What is a supplier register?
- What is an ISO 27001 Supplier Register?
- Why is the ISO 27001 Supplier Register Important?
- ISO 27001 Supplier Register Template
- ISO 27001 Supplier Security Policy Template
- ISO 27001 Supplier Register Example
- ISO 27001 Third Party Risk Assessment
- ISO 27001 Vendor Assessment Process
- Watch the Tutorial
- ISO 27001 Supplier Register Requirements
- ISO 27001 Supplier Register FAQ
ISO 27001 Supplier Register
In this ISO 27001 ultimate guide to the ISO 27001 Supplier Register you will learn
- What an ISO 27001 Supplier Register is
- How to implement it
- An ISO 27001 Supplier Register Template you can download and start using straight away
I am Stuart Barker the ISO 27001 Ninja and this is the ISO 27001 Supplier Register.
What is a supplier register?
A supplier register is a record of all of your supplier and third parties. It captures some key information about the supplier. It is used to manage your suppliers.
What is an ISO 27001 Supplier Register?
The ISO 27001 Supplier Register is a list of all of the suppliers that we have that store, process or transmit data.
The ISO 27001 supplier register focuses on the suppliers and third parties that provide products or services that are specific to the ISO 27001 Scope. In addition to the normal supplier register details it also captures evidence that information security controls are in place. It is a key document in the third party security assurance process.

Why is the ISO 27001 Supplier Register Important?
Suppliers represent the biggest risk to our organisation in terms of information security.
Suppliers provide us with valuable products, services and resources but they are outside of our control.
We trust them with our most valuable information. We trust them to do the right thing. We trust them with our customers and clients information.
We can protect what we control. We do not control our suppliers.
This is where effective third party supplier management comes in.
The ISO 27001 Supplier Security Policy sets our how we manage the risk associated with our suppliers.
The Third Party Supplier Register is the tool we use to actively manage them.
To understand more about why an ISO 27001 Supplier Register is important, read ISO 27001: The Importance Of Third-Party Supplier Security Management.
ISO 27001 Supplier Register Template
The ISO 27001 vendor assessment template enables you to perform ISO 27001 third party risk assessment and ISO 27001 vendor management. Built into a powerful ISO 27001 Supplier Register Template that is pre built and ready to go and comes with a step by step guide on how to manage vendors and suppliers in an ISO 27001 compliant way.

ISO 27001 Supplier Security Policy Template
The ISO 27001 Supplier Security Policy template is one of the required ISO 27001 policies that sets out the organisations approach to vendor security assessment and the use of the supplier register and is a key document in the supplier management process. It is a supporting document and compliments the supplier register.

ISO 27001 Supplier Register Example
The following is an example of an ISO 27001 supplier register used for ISO 27001 vendor assessment and ISO 27001 third party risk assessment .

ISO 27001 Third Party Risk Assessment
The level of assurance we require is based on the ISO 27001 Risk Management process.
Risk is determined by a number of factors including how critical they are to our operation and how much confidence we can evidence that they are doing the right thing for information security.
It may be we add them to the ISO 27001 Risk Register and manage them via risk management.

ISO 27001 Vendor Assessment Process
For suppliers we are looking to seek a level of assurance they are doing the right thing for information security.
The easiest way to achieve this is to check that we have an up to date and in date:
- contract that includes clauses for information security and data protection.
- industry level certification that covers the products and / or services we are buying such as an ISO 27001 certification can provide us with adequate assurance.
The contract and the industry certification is noted and recorded in the supplier register.
We also record what they do for us and how reliant upon them we are.
The ISO 27001 Supplier Register captures key information about the supplier and is used to manage the supplier reviews and supplier assurance processes.
This will lead to how we manage them.
We will know
- Who our suppliers are
- What the do for us
- If we have a contract
- If they have information security certificates
- What data we share with them
- When we last reviewed them and when we will next review them
As part of our assurance we make sure that every supplier in the register should be reviewed at least annually.
We cover how the supplier fits into the information security management system in the ISO 27001 Templates Documents Ultimate Guide.
The exact process is include in the Ultimate ISO 27001 Toolkit as one of the may step-by-step, how to, implementation guides.
Watch the Tutorial
Watch How to create a Third Party Supplier Register in under 5 minutes
In this tutorial video I show you how to create a supplier register / third party register in around 5 minutes. Supplier management is a foundation of data security and many industry certifications including GDPR, ISO 27001, PCI DSS, SOC and a host of others. Supplier management doesn’t have to be hard and it really is easy to create a basic functioning supplier register from scratch.
ISO 27001 Supplier Register Requirements
The ISO 27001 Supplier register satisfies the following clauses in ISO 27001:
ISO 27001 Annex A 5.19 Information Security In Supplier Relationships
Processes and procedures should be defined and implemented to manage the information security risks associated with the use of supplier’s products or services.
ISO27001:2022 Annex A 5.19 Information Security In Supplier Relationships
Here the role of the ISO 27001 supplier register is to identify and record the risks associated with the supplier. It captures a risk score that is used as part of risk management.
ISO 27001 Annex A 5.20 Addressing Information Security in Supplier Agreements
Relevant information security requirements should be established and agreed with each supplier based on the type of supplier relationship.
ISO27001:2022 Annex A 5.20 Addressing Information Security in Supplier Agreements
In the ISO 27001 supplier register we record whether we have a contract that covers the products or services that we are buying. To implement this we would also have a local copy of the contract that we could get access to and we would check that the contract the contract includes information security requirements. We always want to have an in date contract that meets the requirements of this clause before we go for ISO 27001 certification audit.
ISO 27001 Annex A 5.21 Managing Information Security in the ICT Supply Chain
Processes and procedures should be defined and implemented to manage the information security risks associated with the ICT products and services supply chain.
ISO27001:2022 Annex A 5.21 Managing Information Security in the ICT Supply Chain
To apply to processes and procedures we need list of the suppliers.
ISO 27001 Annex A 5.22 Monitoring, review and change management of supplier services
The organisation should regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery.
ISO27001:2022 Annex A 5.22 Monitoring, review and change management of supplier services
There are many types of review that can be performed on our suppliers. As a minimum our review would include that we have a relevant, in date contract with appropriate clauses and that we have insurance for information security practices which usually means we have an in date copy of an appropriate information security certificate, such as an ISO 27001 certificate, that covers the products or services that we have bought. These reviews are captured and recorded in the ISO 27001 supplier register.
ISO 27001 Annex A 5.23 Information Security For Use Of Cloud Services
Processes for acquisition, use, management and exit from cloud services should be established in accordance with the organisation’s information security requirements.
ISO27001:2022 Annex A 5.23 Information security for use of cloud services
Cloud suppliers are suppliers and require to be on the supplier register.
ISO 27001 Supplier Register FAQ
Suppliers are risk assessed relative to what they do for you and how critical they are to you. You will assess that you have a current, in date contract, that includes the products and services you are buying. You will assess the level of assurance that you have that the supplier is doing the right thing for information security and this usually means that they have relevant in date certifications that cover the products and services that you are buying. You would use this third party risk assessment checklist and record it in the third party supplier register.
A trusted vendor database template can be downloaded from High Table: The ISO 27001 Company
Word is not the best tool for recording a list of vendors. A trusted Excel vendor database template can be downloaded from High Table: The ISO 27001 Company.
An approved supplier list template can be can be downloaded from High Table: The ISO 27001 Company.
A supplier register is a list of all of your suppliers. It is ranked on how critical the supplier is to your business and it tracks key information such as if you have a relevant contract with them and the level of assurances that you have for information security.
The best format for a supplier register is a spreadsheet. Microsoft Excel is more than adequate.
Yes. Supplier management and security of the supply chain is a key requirement of information security. After employees, suppliers represent your biggest security risk.
At least annually and based on risk. If the supplier represents a significant risk then consider quarterly reviews.