If you can’t see what’s happening, you can’t protect it.
Logging is how organisations gain visibility, evidence, and control.
Annex A 8.15 exists to ensure organisations log, protect, and review relevant events, enabling detection of security incidents, supporting investigations, and providing accountability across systems and users.
This control is about observability, not just record keeping.

Annex A 8.15 of ISO 27001:2022 focuses on logging of security-relevant events.
At a practical level, this means:
The control does not require logging everything. It expects organisations to log what matters, protect it properly, and use it effectively.
Logs provide:
Without effective logging:
Annex A 8.15 ensures organisations treat logs as a security control, not just a technical by-product.
This control consolidates and replaces ISO 27001:2013 controls 12.4.1, 12.4.2, and 12.4.3.
A pragmatic approach to Annex A 8.15 typically includes the following elements.
Organisations should identify events that are relevant to information security risk.
ISO 27001:2022 highlights logging of events such as:
Logging every event is rarely practical.
Logging the right events is essential.
For logs to be useful, they should typically include:
Incomplete logs limit investigation and assurance value.
Annex A 8.15 relies on accurate timelines.
Organisations should ensure:
Unsynchronised logs undermine incident reconstruction.
Logs are high-value targets.
Organisations should ensure:
Protection techniques may include:
If logs can be changed, they cannot be trusted.
Failure to generate logs is itself a risk.
Organisations should:
Missing logs often indicate deeper control failure.
Logs may contain personal data.
Where logs are shared internally or externally, organisations should consider:
Logging should support security without creating unnecessary privacy risk.
Logging without review provides limited value.
Organisations should ensure:
Analysis may be manual or supported by tooling, depending on scale and risk.
Annex A 8.15 supports active monitoring, particularly for:
Monitoring helps detect:
Detection delayed is detection diminished.
Clear ownership is essential.
Organisations should define:
Unowned logs are rarely reviewed effectively.
In complex environments, organisations may consider:
Centralisation improves visibility, correlation, and response capability.
Where cloud or managed services are used:
Cloud does not remove logging responsibility.
Annex A 8.15 does not require:
It does require organisations to:
Logs only add value when they are used.
Logging failures are often discovered during incidents — not before.
Annex A 8.15 is about knowing what is happening in your environment.
When logging is implemented effectively:
You cannot protect what you cannot see.
Annex A 8.15 ensures organisations turn activity into visibility — and visibility into control.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today