ISO 27001:2022 Annex A 8.16 – Monitoring Activities Explained

Security incidents rarely arrive without warning.
The warning signs are there — if you are looking for them.

Annex A 8.16 exists to ensure organisations monitor ICT activities and systems effectively, so abnormal behaviour, misuse, and security events are detected early and acted upon appropriately.

This control is about visibility and situational awareness, not passive logging.

ISO 27001

Quick Guide: Annex A 8.16 at a Glance

Annex A 8.16 of ISO 27001:2022 focuses on monitoring activities across information systems and networks.

At a practical level, this means:

  • Monitoring systems, networks, and applications for abnormal behaviour
  • Detecting potential security events and incidents early
  • Supporting prevention, detection, and response activities
  • Coordinating monitoring with logging, alerting, and incident response
  • Maintaining oversight of critical and high-risk ICT operations

This is a new control introduced in ISO 27001:2022, reflecting the growing importance of proactive and continuous monitoring.

In-Depth Guide to Annex A 8.16

What Is Annex A 8.16 and Why Does It Matter?

Modern environments are:

  • Highly connected
  • Continuously changing
  • Dependent on complex systems and suppliers

As a result, many incidents are:

  • Detected too late
  • Missed entirely
  • Discovered only after damage occurs

Monitoring bridges the gap between:

  • Preventive controls
  • Incident response
  • Business continuity

Annex A 8.16 ensures organisations do not rely solely on static controls, but actively observe how systems behave in real time.

How to Implement Annex A 8.16 Effectively

A pragmatic approach to Annex A 8.16 typically includes the following elements.

1. Define the Scope of Monitoring Activities

Organisations should determine what needs to be monitored based on risk and criticality.

This commonly includes:

  • Systems and servers
  • Networks and network traffic
  • Applications and platforms
  • Security devices and tools
  • Cloud and third-party services

Monitoring should focus on what matters most, not everything equally.

2. Monitor Normal and Abnormal Behaviour

Effective monitoring relies on understanding what “normal” looks like.

Organisations should:

  • Establish baselines for typical system and user behaviour
  • Identify deviations that may indicate misuse, failure, or attack

Examples of abnormal behaviour include:

  • Unusual access patterns
  • Unexpected system or process termination
  • Spikes in network traffic or resource usage
  • Access to sensitive systems without clear justification

Without a baseline, abnormal behaviour is difficult to recognise.

3. Monitor Network Activity

Annex A 8.16 places particular emphasis on network monitoring.

Organisations should consider monitoring:

  • Inbound and outbound traffic
  • Connections to suspicious or untrusted destinations
  • Attempts to access critical infrastructure
  • Known intrusion or denial-of-service patterns

Network visibility is often the earliest indicator of compromise.

4. Monitor Use of Computing Resources

Unexpected use of resources can indicate:

  • Malware activity
  • Misconfiguration
  • Abuse of privilege
  • Emerging availability issues

Organisations should monitor:

  • CPU, memory, storage, and network utilisation
  • Sudden or sustained changes in usage patterns

This aligns closely with capacity management (Annex A 8.6).

5. Monitor Configuration and System Integrity

Monitoring should also include:

  • Changes to configuration files
  • Unauthorised system modifications
  • Execution of unauthorised code or binaries

Integrity monitoring helps detect:

  • Insider misuse
  • Malware persistence
  • Control bypass
6. Integrate Monitoring With Logging

Monitoring and logging are closely linked but distinct.

Annex A 8.16 expects organisations to:

  • Use logs as a key input to monitoring
  • Correlate events across systems
  • Avoid isolated or fragmented monitoring activities

Monitoring without reliable logging is limited.
Logging without monitoring is reactive.

7. Generate Alerts for Security-Relevant Events

Monitoring should result in action.

Organisations should:

  • Define alert thresholds
  • Reduce false positives
  • Ensure alerts reach the right people promptly

Delayed or ignored alerts undermine the value of monitoring.

8. Use Appropriate Monitoring Tools

ISO 27001:2022 does not mandate specific tools, but supports the use of tools suited to the environment.

Monitoring tools should typically be able to:

  • Handle large volumes of data
  • Detect patterns and anomalies
  • Adjust to changing risk levels
  • Continue operating during component failure

Tool selection should follow risk, scale, and complexity — not fashion.

9. Ensure Monitoring Is Continuous Where Required

For critical systems, monitoring should be:

  • Continuous
  • Resilient
  • Protected against failure

Monitoring systems themselves are critical security components and should not become single points of failure.

10. Define Clear Ownership and Responsibility

Organisations should define:

  • Who owns monitoring activities
  • Who investigates alerts
  • Who escalates incidents

Unclear ownership leads to missed signals and delayed response.

11. Align Monitoring With Incident Management

Annex A 8.16 directly supports incident response.

Monitoring outputs should:

  • Feed into incident management processes
  • Support rapid containment and investigation
  • Provide evidence for post-incident review

Monitoring that does not lead to response is surveillance, not security.

12. Consider Legal and Privacy Requirements

Monitoring may involve personal data.

Organisations should ensure:

  • Monitoring is lawful and proportionate
  • Privacy obligations are respected
  • Monitoring activities are documented and justified

Poorly implemented monitoring can create compliance risk.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Practical Considerations

Annex A 8.16 does not require:

  • Constant human review of all activity
  • Complex analytics everywhere
  • Treating all users as suspects

It does require organisations to:

  • Look for signs of misuse and failure
  • Detect incidents early
  • Act on what monitoring reveals

Most serious incidents are visible — before they escalate.

Common Challenges and How to Overcome Them

  • Monitoring implemented but never reviewed
  • Define alert handling and response processes
  • Too much noise, not enough signal
  • Tune alerts and focus on high-risk activity
  • Fragmented monitoring tools
  • Integrate monitoring and logging where possible
  • No baseline for normal behaviour
  • Establish and review operational baselines

Monitoring fails when it is treated as background noise.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

Final Recommendations

Annex A 8.16 is about seeing what is happening in time to matter.

When monitoring activities are implemented effectively:

  • Incidents are detected earlier
  • Impact is reduced
  • Response is faster and more confident
  • Security becomes proactive rather than reactive

Prevention is never perfect.
Detection is what stops small issues becoming major incidents.

Annex A 8.16 ensures organisations are watching — and ready to act.

In-Depth Guide to Annex A 5.1

What is Annex A 5.1 and Why Does It Matter?

  • What the organisation values
  • How security decisions are approached
  • Where accountability sits
  • Aligns security with business objectives
  • Supports proportionate, risk-based decisions
  • Provides a reference point during incidents and disputes
  • Creates consistency without bureaucracy

How to Implement Annex A 5.1 Effectively

1. Define a Comprehensive Information Security Policy
  • Scope: What the policy applies to (systems, data, people).
  • Objectives: Why security is important for the business.
  • Roles & Responsibilities: Who is accountable for security.
  • Key Principles: Risk management, access control, and data protection.
2. Secure Senior Management Approval
  • Review and approve policies.
  • Ensure resources are allocated for implementation.
  • Lead by example in enforcing security policies.
3. Communicate and Train Employees
  • Include security policies in onboarding and ongoing training.
  • Ensure policies are easily accessible to all employees.
  • Encourage acknowledgment and acceptance of security responsibilities.
4. Regular Review & Continuous Improvement
  • Set a schedule for periodic policy reviews (at least annually).
  • Update policies based on business changes, new threats, or regulatory updates.
  • Conduct audits to ensure compliance and effectiveness.
5. Integrate Policies into the ISMS
  • Use it to develop more detailed security procedures.
  • Ensure policies align with other Annex A controls and broader risk management practices.
Key Differences: ISO 27001:2013 vs ISO 27001:2022
AspectISO 27001:2013ISO 27001:2022
Control StructureTwo separate controls: 5.1.1 & 5.1.2Merged into one control (5.1)
Implementation GuidanceLess prescriptiveMore detailed guidance for policy creation and alignment
Awareness & TrainingNot explicitly mentionedExplicitly requires policies to be part of training programmes
Attributes TableNot includedew attributes table for mapping policies to industry terms
Common Challenges & How to Overcome Them
  • Challenge: Employees don’t follow security policies.
  • Solution: Make policies practical and relevant to daily work. Use real-world examples in training.
  • Challenge: Policies are outdated or too generic.
  • Solution: Schedule annual reviews and update policies based on real threats and business changes.
  • Challenge: Policies are written in technical jargon.
  • Solution: Use plain language that all employees can understand.
  • Challenge: Lack of leadership buy-in.
  • Solution: Show how weak security affects business objectives—costs of breaches, loss of client trust, and legal penalties.
Final Recommendations
  • Make security policies living documents—review, refine, and update regularly.
  • Use policy training and awareness to create a security-conscious workforce.
  • Ensure policies are accessible, relevant, and easy to understand.
  • Keep policies aligned with business strategy and regulatory requirements.
  • Engage leadership in driving security culture from the top down.

The Annex Control Table

ISO 27001:2022 Organisational Controls
ISO 27001:2022 Technological Controls