Skip to content
arrow_back
search
Annex A 5.21 verified ISO/IEC 27001:2022

Managing Information Security in the ICT Supply Chain

Ensure ICT supply chain security by managing risks with processes and procedures.

record_voice_over

Plain language

This control is about making sure the technology products and services you get from your suppliers are secure. If someone in the chain is sloppy or lacks security, it could lead to problems like data breaches, service disruptions, or financial loss. Think of it like ensuring your house is built with quality materials — if one part is weak, the whole structure could be compromised.

Framework

ISO/IEC 27001:2022

Control effect

Preventative

ISO 27001 domain

Organisational controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

19 Mar 2026

Maturity levels

N/A

Official control statement

Processes and procedures shall be defined and implemented to manage the information security risks associated with the ICT products and services supply chain.
verified ISO/IEC 27001:2022 Annex A 5.21
priority_high

Why it matters

Weak ICT supply chain security can lead to data breaches or disruptions as insecure supply chain links provide attackers a backdoor into your organisation.

settings

Operational notes

Regularly assess supplier security practices, contracts and access; track vendor vulnerabilities and updates to manage ICT supply chain risks.

Mapping detail

Mapping

Direction

Controls