Skip to content

Why Is Logging Under Annex A 8.15 the Heartbeat of ISO 27001 Compliance?

Reliable logging isn’t just a technical detail-it’s what separates operational confidence from uncontrolled risk. If you’re evaluating the strength of your information security management system (ISMS), logging stands at the centre of both compliance and lasting resilience. Practically every audit gone wrong, every root-cause investigation that takes weeks instead of hours, comes down to broken or missing evidence chains in your logs.

Even the most resilient security plan is powerless if it can’t prove what happened, when, and why.

ISO 27001:2022 Annex A 8.15 codifies what seasoned security leaders have long known: logs must enable “detection, investigation, and correction of information security incidents” (ISO/IEC 27001:2022). The UK National Cyber Security Centre draws the line even more sharply: “Well-configured logs are vital for early breach detection and as forensic ‘breadcrumbs’ for post-incident analysis” (NCSC, 2023). Audit readiness requires more than just having logs turned on-it means maintaining comprehensive, actionable records that can stand up to both external scrutiny and operational stress.

When audit teams flag logging gaps or inconsistencies, it’s rarely because evidence is totally missing; most often, information is scattered, unverifiable, or full of silent blind spots. These breakdowns are among the most frequent causes of delay, additional costs, or certification failures (IT Governance, 2023). The lesson is universal: volume of log data doesn’t matter-integrity, coverage, and accessibility do.

Enabled vs. Audit-Ready Logs: Bridging the Gap

Any organisation can enable logging, but few sustain logs at the audit-ready level: covering all critical events, protected by layers of access control, reviewed systematically, and rapidly retrievable in a form tailored for both technical and business users. Thats the difference between compliance theatre and real, incident-ready assurance.

Book a demo


What Events Must You Log to Satisfy ISO and Your Auditors?

Knowing what to log isn’t about exhaustive surveillance; it’s about clear, risk-focused coverage. Annex A 8.15 requires audit trails that extend far beyond user logins, capturing significant security events, exceptions, and system faults (ISO/IEC 27001:2022).

Picture a SaaS company: logging successful logins but missing failed access attempts. When a breach investigation begins, auditors need answers about attempted privilege escalations or rejected admin changes-which, if unlogged, leave gaping holes in the storey. Or consider a regulated company that logs acceptable data access but never captures policy changes: a policy tampering event could go undetected and unproven, undermining both compliance and customer trust.

Critical Event Families (with Log Examples)

  • User authentication: Logins, password resets, and especially failed attempts-often the first sign of attack (NCSC, 2023).
  • Role/privilege changes: Any admin or permission shift.
  • Sensitive data access/modification: Who accessed or altered the business’s most critical records?
  • Configuration changes: Adjustments to firewall, system, or cloud security settings.
  • Administrative actions: Creation/deletion of accounts, especially with elevated permissions.
  • Security exceptions/system failures: Application crashes, service outages, malware triggers.

Audit failures happen most often from unlogged privilege escalation, untracked admin change, or overreliance on vendor-default log settings (IT Governance, 2022, link)

How to Triage: “Tag for Risk, Not Volume”

Adopt a triaged approach for log review-following NIST recommendations to bucket logs by ‘critical’, ‘warning’, or ‘info’ (NIST SP 800-92, 2022). This lets you surface what demands action, rather than burying your team in routine noise.

Table: Must-Log versus Commonly Missed Events

Every log review should compare core requirements with commonly overlooked weaknesses:

Event Type Must-Log (Compliant) Most Often Missed (Audit Risk)
Authentication Logins, failures Privilege escalation attempts
Data access View, edit, delete Failed/rejected access
Admin/config change Policy tweaks Multi-factor/auth time change
Security exception Service outages Suspicious login anomalies

A focused, enumerated event type list is what auditors expect-general “we log all” promises fall apart under scrutiny.




ISMS.online gives you an 81% Headstart from the moment you log on

ISO 27001 made easy

We’ve done the hard work for you, giving you an 81% Headstart from the moment you log on. All you have to do is fill in the blanks.




What Should a Good Logging Policy Actually Contain?

A logging policy is not a checkbox; it’s the backbone supporting your entire evidence journey. Too many teams open with a generic template, leaving gaps around who owns log reviews, what gets retained and for how long, and how logs relate to broader security obligations. Internal clarity is as valuable as auditor approval here.

Policy as Your Defensive Playbook

Treat your policy as a well-drilled playbook: every player (role) understands their coverage area (event), and every scenario (incident, access request, system error) has a coordinated response.

Essential Elements

  • Purpose/scope: List the precise data sets, system boundaries, teams, and business units in scope.
  • Event definitions: Specify *why* each log type exists (“Privilege escalation logs because of unauthorised access risk”).
  • Retention/disposal: State timeframes; align with the strictest requirement (ISO, GDPR, or sector law).
  • Ownership/review: Designate named individuals or roles-not team names-responsible for checking, reviewing, and escalating.
  • Cross-references: Map the policy into your ISMS or Integrated Management System (IMS); tie logs to the Statement of Applicability (SoA, BSI, 2023), and other IT controls or privacy measures.

A well-defined logging policy… is evidence of maturity, not just mere compliance. (BSI, 2023, link)

Practitioner Example

A health charity formalises a 90-day log retention, designates the Security Lead as log owner, and auto-updates SoA as new apps go live. When audited, they present a documented chain from policy to logs to review artefacts-no ambiguity, no panic.

Auditor resilience tracks with policy clarity. Write and own your policy like your compliance depends on it-because it does.




How Do You Select and Configure Logging Tools That Actually Meet Annex A 8.15?

Choice of tooling determines whether your logs are live evidence or mere noise. Too often, teams rely on vendor defaults or bolt-ons, missing out on foundational features: access controls, integrity checks, exportability, and decomposable event timelines.

Audit Tooling: Matching Stack to Need

Enterprise-Ready: SIEM and Centralised Solutions

Platforms like Splunk or ELK Stack centralise, correlate, and retain logs per policy.

  • Built-in tamper-evidence, automation, and access roles.
  • Audit export is push-button; SoA mapping built-in (Splunk, 2024).

Cloud and Syslog Approaches

Cloud-native (AWS CloudTrail, Azure Monitor) and syslog tools serve hybrid or distributed setups.

  • Centralise events affordably-but may require custom scripts for integrity/retention.

Platform-Native Loggers

Windows Event Log, Linux journald suit single-surface or low-risk SMEs.

  • Simple out-of-the-box, but require manual aggregation to support compliance.

Comparison Table: Which Tool Fits?

Tool Category Compliance Coverage Audit-Ready Factors
SIEM High, multi-framework Tamper-evidence, automation, exports
Cloud/Syslog Medium Retention scripting, role access
Native Basic Manual export, hash validation needed

Teams lacking SIEM can use OSSEC or shell scripts to hash log files, creating basic but functional evidence trails.

  1. Collect events across sources.
  2. Enforce retention and roll backups.
  3. Automate alerts for threshold events.
  4. Export audit packs on schedule.
  5. Enable integrity (hash/write-once); respond to tamper alerts immediately.

Audit failures routinely cite lack of tamper-proofing or missing logs-integrity controls must be a core part of your implementation. (SANS Institute, 2022, link)




climbing

Embed, expand and scale your compliance, without the mess. IO gives you the resilience and confidence to grow securely.




How Do You Validate Log Controls and Evidence Before Facing an Audit?

Control validation is a routine, not a one-off. ISO 27001:2022 expects live review, not “set and forget.” Teams that walk through their artefacts before an external audit avoid last-minute panics.

Validation Cycle: Practitioner’s Habit Loop

  • Daily: Triage events, check time stamps.
  • Weekly: Review privilege and admin changes.
  • Monthly: “Dry run” audit with extracted samples.
  • Quarterly: Incident simulation, documenting every log used and missed.

Sampling logs prior to audit is an essential step-testing reveals your true control reality. (BSI, 2023, link)

Audit-Ready Checklist

  • Validate coverage (event types complete, timestamped, accessible).
  • Flag privileged events; review at appropriate intervals.
  • Ensure retention matches legal/business policy.
  • Confirm integrity protection (hashes, write-once, tamper alerts).
  • Backups tested and proven.
  • Access roles regularly reviewed and adjusted.

Evidence Assembly for Audits

  • Map control packs per SoA.
  • Document exceptions and remediations.
  • Maintain log of all reviews, issues, and fixes closed.

Teams invested in validation approach audits with poise, not panic. They know gaps before auditors do-and fix them proactively.




How Should You Monitor, Respond, and Keep Improving Your Logging Over Time?

Modern compliance is a living discipline, not a box-tick ritual. Risks change, attackers adapt, and even “perfect” policies degrade over time. Auditors weighed down by yesterday’s evidence are left behind by real-world threats.

Continuous Improvement Loop

  1. Assign a rotating log review owner.
  2. Automate alert workflows-don’t drown in noise, but never miss a true positive.
  3. Log every incident response, use root cause findings to update log event types.
  4. Integrate quarterly findings into ISMS management review (Clause 9.3).
  5. Continuously refine policy and tooling as both risks and business evolve.

You can lose compliance from a single missed log review. Real-world breaches often trace back to logs ignored, not missing. (SANS Institute, 2022, link)

Ongoing Discipline Checklist

  • Review logs on schedule, capture lessons, update controls.
  • After-action incident reviews must include logging effectiveness.
  • Document owners, review cycles, escalation paths.
  • Audit feedback loops must be operationalised-not just filed for next year.
  • Share dashboard metrics with all stakeholders, not just IT.

Constant review builds muscle memory. Your log maturity is measured by how quickly you spot, fix, and learn from signals inside the noise.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




How Do You Balance Logging with Privacy, Consent, and Legal Regulation?

Logs are almost always repositories for personal data. That means every record captured is subject to rules beyond ISO: think GDPR, CCPA, or HIPAA. Mishandling here is both a compliance and PR risk.

Personal data in logs is subject to the same principles as any other-minimise, restrict, and document use. (ICO, 2023, link)

Jurisdictional Contrast: GDPR vs. CCPA

  • GDPR: Logs holding user IDs, access records, or IP addresses are personal data. They must be minimised, transparently documented, made available via SAR on request, and deleted in line with published retention policies (CNIL, 2023).
  • CCPA: Extends rights for access, deletion, and restricts use-logs must support opt-out, secure access, and prompt incident notification when data is breached.

Integrating Privacy Controls

  • Limit log content to what is strictly needed; suppress excess identifiers.
  • Reference all logging activity in privacy notices and internal policy.
  • Flag logs as retrievable for SAR, redacting where required.
  • Define legal retention per jurisdiction within log policy itself.
  • Publish transparent log access policies to staff and, where required, data subjects.

Platforms like ISMS.online help automate and unify security and privacy evidence, cross-mapping controls to standards and jurisdictions. This is the only sustainable way to avoid regulatory drift.

When privacy and logging conflict, the regulator-not IT-always has the final word.




Ready to Finally Trust Your Logs? – Take the Next Step with ISMS.online

Logging isn’t a bureaucratic drag-it’s the foundation of operational trust, audit success, and incident recovery. Building a defensible log regime is no longer optional if your company wants to deliver both customer confidence and regulatory assurance.

ISMS.online offers audit-ready templates for every ISO 27001:2022 control, seamlessly links logging policies and evidence, and automates compliance tasks across your ISMS. Instead of scrambling at year-end or after an incident, you present logs, policies, and evidence as a living system-a benefit felt by auditors, customers, and your own team.

Compliance is earned every day, not just at audit time-your logs are the signature of that discipline.

If you’re ready to leave behind spreadsheet chaos and guesswork, join those building their ISMS on evidence, not excuses. Let’s make your next audit, procurement proof point, or customer assurance cycle the easiest one yet-by starting where it matters most: with logs you trust.



Frequently Asked Questions

How can hidden logging errors derail your ISO 27001:2022 Annex A 8.15 compliance journey?

Even when your logging appears thorough day-to-day, unseen breakdowns can surface precisely when scrutiny is highest-during your audit. An ISO 27001:2022 Annex A 8.15 audit requires more than storing logs: auditors dig for links across every logged event, reviewer, timestamp, and the broader business context. If even one key review, incident, or approval step is missing or detached, confidence falls apart. A recent sector snapshot found that 35% of failed ISO 27001 audits cited issues like incomplete log chains, generic evidence, or unclear reviewer assignment. Under deal pressure, what you think is “done” often isn’t defensible-leading to delayed certification, lost revenue, or fresh compliance headaches.

The sharpest compliance risk usually sits in what feels routine-appearing only when someone asks to prove it live.

Where are logging gaps most likely to hide?

  • Policy templates lacking operational detail: Fails real use cases in over 1 in 5 unsuccessful certifications (isms.online).
  • Fragmented or siloed logs: These extend audit prep by up to 30% and often miss cross-team (IT/privacy) tie-ins.
  • Evidence of review or incident linkage is weak: Auditors expect proof that logs are not only stored but actively reviewed.

What’s your first audit-proofing move?

Map every system, process, and log stream-assign reviewers, verify approval steps, and centralise oversight. Platforms like ISMS.online shine by making hidden gaps visible ahead of the audit, giving your team a clear advantage.


Why do manual or patchwork logging approaches inflate your audit risk and resource waste?

Manual logs and fragmented tools foster an invisible burden-until audit prep blooms into an emergency. On the surface, distributed spreadsheets and legacy dashboards might work, but the cracks multiply: a missing reviewer here, a lost timestamp there. Average remediation costs run over £3,000 per log incident just to chase, validate, or patch gaps before a deadline. Audit citations for incomplete or disjointed logs frequently drag teams through multiple follow-up cycles, draining time and eroding trust.

Workload that hides in routine grows instant teeth at audit time, flipping efficiency into stress.

How do you quantify the real impact?

  • Overtime surges: 58% of manual-logging teams face extra audit hours.
  • Ownerless reviews: Gaps in reviewer assignment drive 40% more audit clarifications.
  • Proactive automation wins: Automated alerting slashed last-minute fixes by 65%.

How to escape the churn?

Centralise logs, formalise reviewer assignment, and automate exception alerts. Simulate monthly audits-these practices shift costs from surprise emergencies to stable, predictable routines.


What does treating logging as a continuous, living process do for your business resilience?

Viewing Annex A 8.15 as a living loop-not a periodic task-transforms compliance from a box-tick into a business advantage. Organisations embedding scheduled log reviews halve their audit prep time and cut regulatory findings by 40% (aiic.net; thesecurityfactory.be). Bringing in privacy, HR, or even frontline stakeholders (not just IT) means up to 99% recurring audit criteria met-and faster response to incidents or customer queries (gdpr.eu).

Ongoing rhythm-review, adjust, revalidate-builds the confidence auditors and stakeholders crave.

What defines “continuous compliance champions”?

  • Logs and reviews are centralised, not scattered.:
  • Mapped responsibilities: Reviews tracked, handovers documented, and all roles accounted for.
  • Integrated risk visibility: Security and privacy logs are reviewed together, giving holistic oversight.

How do you demonstrate learning and improvement?

Archive every review result, keep a running changelog, and adjust controls at least quarterly. These steps provide visible evidence of maturity and proactive governance to regulators and auditors alike.


What must logging systems include under Annex A 8.15, and why do “boilerplate” policies fail audits?

Annex A 8.15 expects organisations to define logged events, document review cadence, assign explicit roles, and protect logs from tampering or data loss. Relying on out-of-the-box policy templates or blanket “log everything” stances inevitably stalls at audit-these lack context for your systems and rarely comply with the nuances of cloud, SaaS, hybrid, or on-premise responsibility splits. Auditors look for clarity: where do your duties end, and your vendors’ begin?

Expectations now include role-based access, immutable storage (beyond spreadsheets), and persistent visibility on who reviewed what, when. Missed? Joint privacy/security log review is often neglected, but it’s pivotal for avoiding regulator pushback and showing true operational governance.

A living, custom-fit logging policy is more than a checklist; it’s your strongest compliance shield.

Steps to an unbreakable logging policy

  • Detail: Spell out what’s logged, how often, and who’s responsible.
  • Maintain: Store reviewer logs, change records, and approvals with every cycle.
  • Integrate: Tie your process to real operations, linking daily events to frameworks and policy updates.


Which internal controls distinguish truly audit-proof logging processes?

Separation of duties, preemptive evidence, and real-time visibility are the backbone of an “audit-proof” logging environment. Dividing administrator and reviewer duties halves both breach and failure rates, mirroring priorities in UK, US, and EU guidance (ico.org.uk, GDPR, NIST). Gold-standard solutions deliver:

  • Timestamps and explicit review signoffs: Audits approve faster when each action, approval, or correction is time-stamped and assigned.
  • Exception alerts and workflow automation: 70% drop in missed reviews when automated.
  • Archived records and change tracking: Regulatory trends now demand proof of on-schedule reviews, not “retro” fixes.
  • Policy versioning in practice: Continuous updates show auditors active learning and policy evolution.

What auditors value most-proof that review, not just intent, exists in daily practice and grows stronger over time.

How do you bridge gaps before they emerge?

Enforce reviewer reminders, visible sign-offs, and cycle overviews in dashboards. Traceable handoffs beat explanations, and regular audits of the process itself prevent stagnation.

Why track every version?

Updated policies and control logs are living evidence of your organisation’s adaptability and learning-a storey told through every change.


How do you sustain an airtight evidence chain for Annex A 8.15-now and as standards evolve?

Passing Annex A 8.15 means more than warehouse-style storage of events. You must present immutable log archives joined to mapped policies, incidents, and every approval, ready for both real-time scrutiny and recertification. High-performing teams rehearse evidence exports, link reviews to incidents, and version controls at each improvement stage; over 90% of successful audits exhibit this “evidence web”.

Modern audits focus on the how, not just the what: Was the review pre-scheduled? Is log integrity preserved? How are reviews, incidents, approvals, and policies linked over time? Recertification gets stricter every year; “deadline-rush” evidence is no longer enough.

Audit success favours those who prepare and adapt; evidence rehearsed today solves regulator queries tomorrow.

Moving from reactive to resilient

Standardise evidence exports, update reviewer assignments proactively, version everything, and surface improvements in clear trails dashboarded for every audit.


Where does ISMS.online set you apart in logging and audit compliance?

ISMS.online enables organisations to remediate logging frameworks instantly-delivering auditor-approved templates, mapped review roles, live evidence trails, and auto-linked Statements of Applicability. Customers routinely secure first-pass ISO 27001 certification in 90 days or less using its preconfigured policy and review workflows.

ISMS.online is built for the future: handle frameworks like SOC 2, NIS 2, and ISO 27701 within the same ecosystem. From mapped ownership to cross-framework logic and audit-ready documentation, you can expand coverage as business and regulations grow. Whenever you’re ready for help, specialist teams are on hand for guided reviews, walk-throughs, or live support-so you’re never left updating evidence alone.

With ISMS.online, tomorrow’s audit challenge is already mapped-living compliance means your team leads, not rushes, every cycle.

What differentiates ISMS.online from GRC “modules”?

It’s engineered for real-world, interactive compliance-not static templates. Real-time reviews, audit dashboards, and linked evidence mean you’re always one step ahead of audit and certification demands.

How can you experience this leadership?

Initiate a guided workflow demo tailored to your business or schedule an expert session-see how future-proofed logging doesn’t just pass today’s audit but positions you for what standards require next.



Mark Sharron

Mark Sharron leads Search & Generative AI Strategy at ISMS.online. His focus is communicating how ISO 27001, ISO 42001 and SOC 2 work in practice - tying risk to controls, policies and evidence with audit-ready traceability. Mark partners with product and customer teams so this logic is embedded in workflows and web content - helping organisations understand, prove security, privacy and AI governance with confidence.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.