Compliance Framework

ISO 27001 Audit Logging Requirements

ISO 27001 mandates audit logging as part of Annex A controls for information security event logging, protection of log information, and administrator activity logging.

Overview

ISO 27001 is the international standard for information security management systems (ISMS). The 2022 revision reorganized controls into four themes: Organizational, People, Physical, and Technological. Audit logging falls primarily under Annex A control A.8.15 (Logging) and A.8.16 (Monitoring activities). Organizations must produce logs, protect them from tampering, and review them regularly. ISO 27001 certification is recognized globally and increasingly required for cross-border business.

Key facts

ISO 27001:2022 contains 93 controls organized into 4 themes (reduced from 114 in the 2013 version)

Control A.8.15 explicitly requires protection of logs against tampering

Certification requires annual surveillance audits and recertification every 3 years

Over 70,000 organizations worldwide hold ISO 27001 certification

Retention period: Organization-defined, typically 1-3 years (must align with risk assessment)

Audit logging requirements

A.8.15 - Logging

Produce, store, protect, and analyze logs that record activities, exceptions, faults, and information security events. Logging facilities and log information must be protected against tampering and unauthorized access.

How AuditKit helps: Immutable hash chain logging with cryptographic tamper detection

A.8.16 - Monitoring Activities

Networks, systems, and applications must be monitored for anomalous behavior. Appropriate actions must be taken to evaluate potential security incidents.

How AuditKit helps: SIEM streaming enables real-time anomaly detection and alerting

A.5.23 - Information Security for Cloud Services

Processes for acquisition, use, management, and exit from cloud services must include logging and monitoring requirements.

How AuditKit helps: Multi-tenant isolation ensures cloud audit data is properly segregated

A.8.10 - Information Deletion

Information stored in systems and devices must be deleted when no longer required. Deletion events must be logged.

How AuditKit helps: Structured event logging captures data lifecycle events including deletion with full context

Frequently asked questions

What does ISO 27001 require for audit logging?

ISO 27001 Annex A control A.8.15 requires organizations to produce, store, protect, and analyze logs recording activities, exceptions, faults, and security events. Logs must be protected from tampering and unauthorized access. AuditKit provides cryptographic tamper protection through SHA-256 hash chains and Merkle tree proofs.

How does AuditKit help with ISO 27001 certification?

AuditKit directly addresses ISO 27001 controls A.8.15 (Logging), A.8.16 (Monitoring), and A.5.23 (Cloud Security) by providing immutable audit trails, real-time SIEM streaming, and tenant-isolated logging. The built-in React viewer gives auditors a clear interface to review evidence.

Related compliance frameworks

Related resources

Get ISO 27001-ready with AuditKit

Tamper-proof audit logging that satisfies ISO 27001 requirements. Start from $99/mo with no lock-in.