How to Implement ISO 27001 Annex A 8.16 Monitoring Activities
Security is not a passive state. You cannot simply build a wall around your data and hope for the best. You must watch that wall. This is the core principle behind ISO 27001 Annex A 8.16. While other controls focus on preventing attacks, this control focuses on detecting them when they inevitably happen.
As a certification body, we often see organizations confuse this control with simple logging. They collect terabytes of data but never look at it. This is not compliance. Compliance is about having the “eyes” to see anomalous behavior and the process to act on it. This guide will walk you through exactly what we expect to see during an audit.
Table of contents
- How to Implement ISO 27001 Annex A 8.16 Monitoring Activities
- Understanding the Requirement
- Step 1: Establish a Baseline
- Step 2: Define Your Scope
- Step 3: Select Your Tools
- Step 4: The Human Element
- What the Auditor Will Look For
- Legal and Privacy Considerations
- Common Pitfalls to Avoid
- Next Steps for Your Organization
Understanding the Requirement
Annex A 8.16 requires you to monitor networks, systems, and applications for anomalous behavior. The goal is to evaluate potential information security incidents. In simpler terms, you need a digital burglar alarm. You must be able to tell the difference between “business as usual” and “something is wrong.”
This control works hand in hand with Annex A 8.15 (Logging). Logging provides the memory, while monitoring provides the vigilance. You cannot have one without the other.
Step 1: Establish a Baseline
You cannot detect what is abnormal if you do not know what is normal. This is the most critical step in your implementation. You need to define a baseline of activity for your environment.
Consider what a normal day looks like. When do your staff log in? What volume of data usually leaves your network? Which countries do your users access your systems from? If your marketing team normally logs in from London at 9 AM, a login from North Korea at 3 AM is an anomaly. Without a baseline, that event is just another line of text in a log file. With a baseline, it is an alarm.
Step 2: Define Your Scope
You cannot monitor everything. If you try to watch every single event, you will drown in noise. You must take a risk-based approach. Identify your most critical assets and the threats that face them.
We generally expect your monitoring scope to cover four key areas:
- Inbound and Outbound Traffic: Watch for large file transfers or connections to known malicious IP addresses.
- System Performance: A sudden spike in CPU usage could indicate malware, such as crypto-mining software.
- Access Control: Monitor for failed login attempts and the use of privileged admin accounts.
- Application Logs: Look for errors or transactions that violate your business logic.
Step 3: Select Your Tools
Manual monitoring is impossible for most modern businesses. You will need tools to help you. The scale of your tools should match the scale of your risks.
For smaller organizations, cloud-native monitoring tools included with your email or server provider might be sufficient. These platforms often have built-in threat detection capabilities. For larger organizations, you may need a Security Information and Event Management (SIEM) system. This software aggregates logs from various sources and correlates them to find patterns.
Regardless of the tool, the auditor will ask how you configured it. We want to know that you tuned the tool to your specific baseline, rather than just using the default settings.
Step 4: The Human Element
Tools can generate alerts, but they cannot make decisions. You need a human process to review and act on these alerts. This is often where we find non-conformities during audits.
You must assign responsibility. Who checks the dashboard? Who receives the email alerts? What do they do when an alert comes in? You should have a clear procedure that dictates the response to different types of alerts. For example, a “critical” alert might require an immediate phone call to the Head of IT, while a “low” priority alert might be reviewed during a weekly meeting.
What the Auditor Will Look For
When we visit your office for your ISO 27001 certification audit, we are looking for evidence of activity. We do not just want to see a shiny dashboard. We want to see the history.
We will ask to see your alert history. We will pick a specific alert from last month and ask you to show us the investigation trail. Did someone look at it? Was it a false positive or a real incident? Did you document the conclusion?
We will also look for evidence of regular reviews. If your monitoring system sends 500 email alerts a day and nobody reads them, the control is not effective. We would prefer to see a system that sends 5 alerts a week that are all investigated thoroughly.

Legal and Privacy Considerations
Monitoring involves watching people. This raises privacy concerns. You must ensure your monitoring activities comply with local laws, such as GDPR. Transparency is your best defense here.
Ensure your employees know they are being monitored. This is typically handled through an Acceptable Use Policy or an Employee Privacy Notice. You should only collect data that is necessary for security purposes. Do not use security tools to monitor employee productivity unless you have a specific legal basis to do so.
Common Pitfalls to Avoid
Implementation often fails due to a few common mistakes. Avoid these to ensure a smooth audit:
- Setting and Forgetting: The threat landscape changes. Your monitoring rules should be reviewed at least annually or when significant changes occur.
- Alert Fatigue: If your team gets too many false alarms, they will stop paying attention. Tune your thresholds to reduce noise.
- Ignoring the Cloud: Do not forget to monitor your SaaS applications. They often hold your most sensitive data.
Next Steps for Your Organization
Now that you understand the requirements, your next step should be a gap analysis. Compare your current monitoring capabilities against your risk register. Are your highest risks currently being watched? If the answer is no, you know where to start working.
