Zum Hauptinhalt springen
Starter Kit · Register

Stakeholder Requirements Register

Updated on 2 min Reviewed by: Cenedril-Redaktion
Clause 4.1Clause 4.2 ISO 27001NIS2 Art. 21

ISO 27001 Clause 4.2 requires you to identify the interested parties of your ISMS and document their information security requirements. This register is the tool for that job. It forces you to systematically record who has expectations of your ISMS — and what those expectations are.

What does it contain?

The CSV template includes columns for the key information Clause 4.2 requires:

  • Interested party — who is placing the requirement? (e.g. customers, regulator, executive management, works council)
  • Requirement — what is specifically expected? (e.g. 99.9% availability, annual SOC 2 report, GDPR compliance)
  • Type — legal, contractual, regulatory, or implicit
  • Relevance — how strongly does the requirement influence the ISMS?
  • Measure — how is the requirement addressed? (reference to policy, control, process)

How to use the template

1. Identify interested parties. Start with the obvious groups: customers, regulators, executive management, employees, suppliers. Then expand: insurers, shareholders, industry associations, certification bodies. For each group, ask: do they have expectations regarding our organisation’s information security?

2. List requirements per party. A single party can have multiple requirements. A customer may simultaneously demand availability, confidentiality, and regular security reports. Each requirement gets its own row.

3. Assess relevance. Which requirements influence the scope, objectives, or risk acceptance criteria of your ISMS? This assessment is the core of Clause 4.2 — it determines what enters the scope and what stays out.

4. Establish links. Every relevant requirement should point to at least one measure: a policy, an Annex A control, or an operational process. Requirements without measures are open gaps.

5. Review annually. New customers, new contracts, new legislation — the requirements landscape changes. Schedule a review at least once a year, ideally before the management review.

Register Template

Stakeholder Requirements Register

IDStakeholderNeedDerived RequirementSourcePriorityCovered ByStatus
SR-001CustomersTheir data is confidential and availableEncryption in transit and at rest; 99.5% availability SLACustomer contractsHighCryptography Policy + BCM PolicyCovered
SR-002CustomersBreach notification within reasonable timeBreach notification within 72h to affected customersMaster services agreementHighIncident Response PlanCovered
SR-003Top ManagementRegulatory compliance without surprisesQuarterly compliance dashboard + annual management reviewCompany strategyHighManagement review procedureCovered
SR-004EmployeesClear rules for using IT equipment and dataAcceptable Use Policy published and acknowledgedWorks council agreementMediumAcceptable Use PolicyCovered
SR-005Works councilNo covert monitoring of employeesTransparent logging rules and no behaviour profilingWorks council agreement 2024HighAcceptable Use Policy section 7Covered
SR-006BfDI (GDPR regulator)Lawful processing of personal dataRoPADPIA processbreach notification processGDPR Art. 5 30 33 35High
SR-007BSI (NIS2 authority)Early warning within 24h of significant incidents24h early warning + 72h incident notificationNIS2 Art. 23HighIncident Response PlanCovered
SR-008SuppliersClear contractual security obligationsSupplier security clauses in contractsSupplier Security PolicyMediumSupplier Security PolicyCovered
SR-009AuditorsTimely access to evidenceEvidence repository per ISO clauseISO 27001 audit planMediumDocument control processCovered
SR-010InsuranceDemonstrable baseline controlsAnnual controls attestationCyber policy 2026MediumSoA + management reviewCovered
SR-011Data subjectsExercise their GDPR rightsProcess for subject access requests within 30 daysGDPR Art. 15-22HighDPO SAR procedureCovered
SR-012PressFactual information during incidentsPre-approved holding statementCrisis comms policyLowCrisis communication templateCovered

Sources

ISO 27001 Controls Covered

Clause 4.1 Understanding the organisation and its context Clause 4.2 Understanding the needs and expectations of interested parties

Frequently asked questions

Who are 'interested parties' under ISO 27001?

Anyone who places requirements on your ISMS or is affected by it. Typical examples: customers, regulators, executive management, employees, suppliers, insurers. The circle is intentionally broad — you decide which requirements are relevant to your ISMS.

How detailed do the requirements need to be?

Detailed enough that you can explain in an audit why a specific requirement influenced your ISMS (or was deliberately excluded). One row per requirement with source, description, and relevance assessment is sufficient. Multi-page analyses are neither required nor helpful.

Does this register overlap with the legal compliance register?

Partially. The legal compliance register (A.5.31) documents legal and contractual obligations in detail. The stakeholder requirements register is broader — it also captures implicit expectations (e.g. customer expectations around availability) that have no legal basis but still shape the scope and objectives of your ISMS.