ISO 27001:2022 Annex A 6.8 – Information Security Event Reporting Explained

Security incidents are rarely sudden.
Most start as small, observable events that were not reported in time.

Annex A 6.8 exists to ensure organisations enable, encourage, and support the prompt reporting of information security events, so potential incidents are identified early and handled before impact escalates.

This control is about visibility and speed, not blame.

ISO 27001

Quick Guide: Annex A 6.8 at a Glance

Annex A 6.8 of ISO 27001:2022 focuses on information security event reporting.

At a practical level, this means:

  • Ensuring people know what to report
  • Making reporting simple and accessible
  • Defining clear reporting channels
  • Encouraging prompt reporting of suspected or observed events
  • Supporting effective incident assessment and response

The control does not require people to diagnose incidents or investigate root cause. It expects organisations to make reporting easy and judgement-free.

In-Depth Guide to Annex A 6.8

What Is Annex A 6.8 and Why Does It Matter?

Many serious incidents are preceded by warning signs, such as:

  • Suspicious emails
  • Unusual system behaviour
  • Access issues
  • Unexpected changes
  • Suspected malware activity

If these events are:

  • Not recognised
  • Not reported
  • Or reported too late

…the organisation loses valuable response time.

Annex A 6.8 ensures organisations do not rely on chance discovery or technical monitoring alone, but actively involve people as an early warning mechanism.

This control consolidates and replaces event and weakness reporting controls from ISO 27001:2013.

How to Implement Annex A 6.8 Effectively

A pragmatic approach to Annex A 6.8 typically includes the following elements.

1. Define What Constitutes an Information Security Event

People cannot report what they do not recognise.

Organisations should provide clear examples of reportable events, such as:

  • Suspected phishing or malware
  • Unauthorised access or access attempts
  • Loss or theft of devices or information
  • Unexpected system behaviour
  • Failure or bypassing of security controls
  • Policy or procedural breaches

Clarity reduces hesitation and uncertainty.

2. Establish Clear and Simple Reporting Channels

Reporting mechanisms should be:

  • Easy to find
  • Easy to use
  • Available when needed

Common approaches include:

  • A dedicated email address
  • A service desk or ticketing route
  • A defined contact role or function

Complex reporting discourages early action.

3. Make Reporting Prompt and Expected

Personnel should understand that:

  • Reporting is expected
  • Early reporting is valued
  • Suspicion is sufficient — proof is not required

The goal is early visibility, not perfect accuracy.

4. Ensure People Are Not Expected to Investigate

Annex A 6.8 is explicit in intent:

  • Reporters are not responsible for validating incidents
  • Investigation should be handled by competent personnel

This avoids accidental evidence destruction, escalation errors, or legal exposure.

5. Record Reported Events

Reported events should be recorded in a way that supports:

  • Assessment and prioritisation
  • Trend analysis
  • Incident response and learning

Records may include:

  • Event reports
  • Logs and alerts
  • Change or problem records

Recording supports consistency and improvement.

6. Link Event Reporting to Incident Management

Event reporting should feed directly into:

Disconnected reporting loses value quickly.

7. Reinforce Reporting Through Awareness and Training

Event reporting works best when reinforced through:

  • Security awareness activities
  • Induction and onboarding
  • Real-world examples and scenarios

People report what feels relevant and supported.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 6.8 does not require:

  • Formal incident classification by reporters
  • Complex reporting tools
  • Zero false positives

It does require organisations to:

  • Remove barriers to reporting
  • Avoid discouraging or penalising reporters
  • Treat reporting as a positive security behaviour

A single early report often prevents a far larger incident.

Common Challenges and How to Overcome Them

  • People unsure what to report
  • Provide clear examples and guidance
  • Reporting channels hard to find or use
  • Keep reporting simple and visible
  • Fear of blame or embarrassment
  • Promote a supportive, no-fault reporting culture
  • Events reported but not acted upon
  • Ensure reports feed into incident management processes

Event reporting fails most often through culture, not technology.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 6.8 is about turning people into an early warning system.

When information security event reporting is implemented effectively:

  • Incidents are identified earlier
  • Response time improves
  • Impact is reduced
  • Organisational awareness increases
  • Security culture strengthens

People see what systems often miss.
Annex A 6.8 ensures organisations listen in time.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls