top of page

ISO 27001 Control 5.5 Contact with authorities

Writer's picture: Alan ParkerAlan Parker

Establishing and Maintaining Contact with Authorities

Effective communication with relevant authorities is a cornerstone of an organisation's information security strategy. Establishing and maintaining these connections enhances compliance, improves incident management, and bolsters business continuity, all while keeping organisations prepared for regulatory changes.


The Importance of Contacting Authorities

The primary goals of establishing and maintaining contact with authorities are to:

  • Facilitate consistent and timely communication about information security matters.

  • Ensure compliance with legal, regulatory, and supervisory obligations.

  • Prepare for and adapt to current and future regulatory expectations.


Guidelines for Establishing Contact

Organisations should develop clear protocols for interactions with authorities, detailing:


1. When to Initiate Contact

  • Situations requiring communication with authorities include:

    • Reporting information security incidents.

    • Seeking assistance during cyberattacks.

    • Addressing compliance or regulatory inquiries.


2. Designated Points of Contact

  • Assign specific roles or teams responsible for liaising with:

    • Law enforcement agencies.

    • Regulatory bodies.

    • Supervisory authorities.


3. Incident Reporting Procedures

  • Establish standardised procedures for incident reporting, which should include:

    • Detailed descriptions of the incident.

    • Mitigation steps taken.

    • Key contact information for follow-up communication.


Benefits of Maintaining Authority Relationships


1. Improved Regulatory Compliance

Regular communication with regulatory bodies enables organisations to:

  • Stay informed about changes to laws and regulations.

  • Anticipate upcoming compliance requirements, reducing the risk of violations.


2. Enhanced Incident Response

During security incidents, established relationships with authorities provide:

  • Faster escalation of issues to the appropriate bodies.

  • Expert support for containment and resolution efforts.

  • Assistance in taking action against sources of attacks, when applicable.


3. Strengthened Business Continuity

Connections with utility providers and emergency services support:

  • Coordination with fire departments during physical crises.

  • Telecommunications support for uninterrupted operations.

  • Water supply management for critical equipment cooling.


Integrating Authority Contacts into Security Plans


1. Incident Management

Authority contact details should be a key component of the organisation’s incident management plan. Organisations should:

  • Document procedures for notifying authorities during incidents.

  • Maintain an up-to-date directory of relevant contacts.


2. Business Continuity Planning

Authority contact information is essential in contingency planning, ensuring:

  • Clear communication protocols for emergencies.

  • Preparedness among key personnel for liaising with relevant authorities.


Key Types of Authorities to Engage

Organisations should establish relationships with various authorities, including:

  • Regulatory Bodies: To stay informed about compliance updates.

  • Law Enforcement: For reporting cyberattacks or fraudulent activities.

  • Utility Providers: To ensure continuity of critical services such as electricity, water, and telecommunications.

  • Emergency Services: For physical safety and disaster response support.


Conclusion

Maintaining robust relationships with relevant authorities is integral to an organisation’s information security framework. These connections ensure regulatory compliance, improve response capabilities during security incidents, and support operational resilience. By establishing clear protocols, assigning responsibilities, and incorporating these contacts into broader security strategies, organisations can effectively navigate the complex landscape of information security and regulatory compliance.

Comments


About the author

Alan Parker is an IT consultant and project manager who specialises in IT governance, process implementation, and project delivery. With over 30 years of experience in the industry, Alan believes that simplifying complex challenges and avoiding pitfalls are key to successful IT management. He has led various IT teams and projects across multiple organisations, continually honing his expertise in ITIL and PRINCE2 methodologies. Alan holds a degree in Information Systems and has been recognised for his ability to deliver reliable and effective IT solutions. He lives in Berkshire, UK, with his family.

bottom of page