Security incidents rarely arrive without warning.
The warning signs are there — if you are looking for them.
Annex A 8.16 exists to ensure organisations monitor ICT activities and systems effectively, so abnormal behaviour, misuse, and security events are detected early and acted upon appropriately.
This control is about visibility and situational awareness, not passive logging.

Annex A 8.16 of ISO 27001:2022 focuses on monitoring activities across information systems and networks.
At a practical level, this means:
This is a new control introduced in ISO 27001:2022, reflecting the growing importance of proactive and continuous monitoring.
Modern environments are:
As a result, many incidents are:
Monitoring bridges the gap between:
Annex A 8.16 ensures organisations do not rely solely on static controls, but actively observe how systems behave in real time.
A pragmatic approach to Annex A 8.16 typically includes the following elements.
Organisations should determine what needs to be monitored based on risk and criticality.
This commonly includes:
Monitoring should focus on what matters most, not everything equally.
Effective monitoring relies on understanding what “normal” looks like.
Organisations should:
Examples of abnormal behaviour include:
Without a baseline, abnormal behaviour is difficult to recognise.
Annex A 8.16 places particular emphasis on network monitoring.
Organisations should consider monitoring:
Network visibility is often the earliest indicator of compromise.
Unexpected use of resources can indicate:
Organisations should monitor:
This aligns closely with capacity management (Annex A 8.6).
Monitoring should also include:
Integrity monitoring helps detect:
Monitoring and logging are closely linked but distinct.
Annex A 8.16 expects organisations to:
Monitoring without reliable logging is limited.
Logging without monitoring is reactive.
Monitoring should result in action.
Organisations should:
Delayed or ignored alerts undermine the value of monitoring.
ISO 27001:2022 does not mandate specific tools, but supports the use of tools suited to the environment.
Monitoring tools should typically be able to:
Tool selection should follow risk, scale, and complexity — not fashion.
For critical systems, monitoring should be:
Monitoring systems themselves are critical security components and should not become single points of failure.
Organisations should define:
Unclear ownership leads to missed signals and delayed response.
Annex A 8.16 directly supports incident response.
Monitoring outputs should:
Monitoring that does not lead to response is surveillance, not security.
Monitoring may involve personal data.
Organisations should ensure:
Poorly implemented monitoring can create compliance risk.
Annex A 8.16 does not require:
It does require organisations to:
Most serious incidents are visible — before they escalate.
Monitoring fails when it is treated as background noise.
Annex A 8.16 is about seeing what is happening in time to matter.
When monitoring activities are implemented effectively:
Prevention is never perfect.
Detection is what stops small issues becoming major incidents.
Annex A 8.16 ensures organisations are watching — and ready to act.
We can help you understand your actual security needs and even if we cant help we can point you in the right direction
Talk to a security expert today