Skip to content
Control Stack logo Control Stack
Annex A 5.31 ISO/IEC 27001:2022

Compliance with Information Security Legal Requirements

Identify and stay updated on information security legal obligations to avoid breaches.

🏛️ Framework

ISO/IEC 27001:2022

🧭 Control effect

Preventative

🧱 ISO 27001 domain

Organisational controls

🔐 Classifications

N/A

🗓️ Official last update

24 Oct 2022

✏️ Control Stack last updated

19 Mar 2026

🎯 Maturity levels

N/A

Official control statement
Legal, statutory, regulatory and contractual requirements relevant to information security and the organization's approach to meet these requirements shall be identified, documented and kept up to date.

Source: ISO/IEC 27001:2022

Plain language

This control ensures your organisation knows and keeps updated with all the legal rules about information security. If you miss these rules, your business might face fines or other legal issues, which could harm your reputation and finances.

Why it matters

Failure to track legal requirements could lead to significant fines, litigation risks, and damage to the organisation's reputation.

Operational notes

Maintain a legal/regulatory obligations register; review quarterly with legal counsel and security, record changes, owners and evidence of compliance actions.

Implementation tips

  • The IT manager should identify all laws and regulations relevant to information security that could affect the business. This can be done by consulting with legal advisors and checking resources from OAIC for Australian regulations such as the Privacy Act 1988.
  • The compliance officer should document legal and regulatory requirements. This involves recording all identified legal obligations in an organised and accessible format, like a compliance register, and ensuring it is stored securely and protected.
  • The HR team should assign specific roles within the organisation to take responsibility for meeting these requirements. This might involve designating compliance leadership roles to oversee how well the organisation adapts to changes in legal obligations.
  • The Procurement department should ensure that contracts with suppliers and clients include clauses that address compliance with information security requirements. They should work with legal advisors to draft these clauses according to Australian standards.
  • The organisation's board should conduct regular reviews of these legal requirements and update policies and procedures accordingly. This can be scheduled as part of quarterly risk review meetings or during the annual policy review process to consider any legislative changes.

Audit / evidence tips

  • Ask: Ask for the compliance register or document listing legal and regulatory requirements for information security.

    Good: A well-maintained compliance register with entries showing recent reviews and updates, clearly identifying who is responsible for compliance.

  • Ask: Ask to see contracts with suppliers and clients that mention information security requirements.

    Good: Contracts with clear, relevant information security clauses that align with identified legal and regulatory requirements.

  • Ask: Ask for records of assigned roles and responsibilities related to legal compliance.

    Good: A clear organisational chart or document showing assigned roles with descriptions detailing compliance duties.

  • Ask: Ask for evidence of regular reviews and updates to compliance documents.

    Good: Recent meeting minutes or logs showing discussions and actions on reviewing and updating legal requirement documentation.

  • Ask: Ask for any communication or workshops held with staff about compliance requirements.

    Good: Documented evidence of regular staff engagement activities on compliance topics, indicating active dissemination of information.

Cross-framework mappings

How Annex A 5.31 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ASD ISM

Control Notes Details
Supports (13)
ISM-0009 ISM-0009 requires identifying supplementary controls needed for a system based on its unique context and risk tolerance
ISM-0041 ISM-0041 requires documenting a system’s applicable controls and any additional controls in a system security plan annex
ISM-0047 Annex A 5.31 requires the organisation to document and maintain its information security legal, regulatory, and contractual requirements ...
ISM-0137 ISM-0137 requires organisations to seek legal advice before permitting continued intrusion activity to gather evidence, explicitly addres...
ISM-0181 ISM-0181 requires cabling infrastructure to be installed in accordance with relevant Australian Standards, directed by ACMA
ISM-0499 ISM-0499 requires compliance with ASD communications security doctrine and policy produced for HACE management and operation
ISM-1478 Annex A 5.31 requires the organisation to identify, document, and keep current all information security legal, statutory, regulatory, and...
ISM-1571 Annex A 5.31 requires the organisation to identify and document contractual requirements relevant to information security and keep them u...
ISM-1626 ISM-1626 requires an organisation to seek legal advice when developing and implementing an insider threat mitigation program
ISM-1880 ISM-1880 requires timely reporting to customers and the public for cyber incidents involving customer data
ISM-2002 Annex A 5.31 requires identifying and maintaining up-to-date information security legal and regulatory requirements and documenting how t...
ISM-2008 ISM-2008 mandates compliance conditions for a regulated class of equipment (medical devices) when used in SECRET/TOP SECRET areas, includ...
ISM-2033 ISM-2033 requires software security requirements to be documented, stored securely, and maintained throughout the SDLC

Mapping detail

Mapping

Direction

Controls