ISO 27001:2022 compliance provides greater assurance that an organization is adequately managing its cybersecurity practices, such as protecting personal data and other types of sensitive data.
Third-party risk management (TPRM) programs can benefit immensely from implementing the relevant ISO 270001 controls to mitigate the risk of significant security incidents and data breaches.
However, developing a robust TPRM program is already a time and resource-intensive feat on its own, without even considering the framework’s requirements.
This post outlines which ISO controls are relevant to TPRM and how the UpGuard platform can help meet each control’s objectives.
If you’re already familiar with ISO 27001, click here to skip ahead to the third-party risk requirements.
ISO 27001 is an international standard that guides the development of an information security management system (ISMS) to manage data security and information security effectively.
Developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), the framework is also known as ISO/IEC 27001.
It was first released in 2005, with the most recent version published in October 2022, revising the longstanding ISO/IEC 27001:2013.
The standard consists of two parts:
The updated Organizational and Technological controls in ISO 27001:2022 address third-party risk through enhanced requirements for supplier relationships and supply chain security.
The new Annex A includes 11 new controls, addressing modern security challenges such as threat intelligence, data leakage prevention, and secure configuration management. The previous domain structure (A.5 to A.18) has been replaced with a more streamlined approach that simplifies control selection and aligns with modern risk management practices.
Learn how UpGuard supports alignment with ISO 27001 >
The security controls applicable to third-party risk management are predominantly found under the Organizational Controls section of Annex A in the ISO 27001:2022 framework. These controls provide guidance for managing the security risks associated with third-party vendors, service providers, and suppliers.
The specific links to TPRM in this section as as follows:
These controls aim to bolster supply chain risk management to reduce the impact of security incidents involving third-party entities in the supply chain.
You can use this free ISO 27001 risk assessment template to track each vendor's alignment with ISO 27001:2022.
"An inventory of information and other associated assets, including owners, shall be developed and maintained."
Control 5.9 of ISO 27001:2022 emphasizes the need for organizations to maintain an accurate and up-to-date inventory of their information and associated assets. This inventory list should ideally comprise physical, intangible, and digital assets.
There are six key aspects to control 5.9:
UpGuard's Attack Surface Management features allow organizations to map their external digital footprint to help organizations maintain and up-to-date inventory of all their internet-facing IT assets interacting with critical information systems.
Watch this video for an overview of how the UpGuard platform can be used for Attack Surface Management.
"Processes and procedures shall be defined and implemented to manage the information security risks associated with the use of supplier’s products or services."
Control 5.19 of ISO 27001:2022 ensures organizations have procedures for identifying and managing risks arising from supplier relationships. This control requirement is an important aspect of a data breach prevention strategy in a modern business context with increasing dependence on third-party services
Key aspects of 5.19 – Information Security in Supplier Relationships include:
UpGuard automatically discovers potential vendor risks across 70+ attack vectors, allowing organizations to prevent potential data breaches through real-time reporting and automated remediation workflows.
"Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship."
Control 5.20 of ISO 27001:2022 focuses on ensuring organizations formally establish and document the information security requirements their suppliers must adhere to. These practices could relate to information security controls focused on mitigating data breaches, and those relating to regulatory compliance.
Key aspects of 5.20 – Addressing Information Security within Supplier Agreements include:
UpGuard's Trust Exchange product allows organizations to easily store security documentation, such as completed security questionnaires and audit reports, relating to each supplier relationship.
Sign up to Trust Exchange for free >
"Processes and procedures shall be defined and implemented to manage the information security risks associated with the ICT products and services supply chain."
Control 5.21 of ISO 27001:2022 focuses on managing the information security risks posed by suppliers and vendors within the Information and Communication Technology (ICT) supply chain
Key aspects of 5.21 – Managing Information Security in the ICT Supply Chain include:
UpGuard's real-time monitoring of third-party entity security postures through security ratings could help organizations detect ICT security risks in their supply chain before they're exploited by cybercriminals.

Learn about UpGuard's security ratings >
"The organization shall regularly monitor, review, evaluate, and manage changes in supplier information security practices and service delivery."
Control 5.22 of ISO 27001:2022 focuses on the ongoing oversight of suppliers’ security practices and the services they provide. The purpose of this control is to ensure that suppliers maintain high standards of information security throughout their relationship with the organization.
Key aspects of 5.22 – Monitoring, Review, and Change Management of Supplier Services include:
UpGuard offers real-time attack surface visibility, helping organizations continuously monitor evolving threats in their expanding external attack surface.
