A security breach is discovered three months after the initial compromise. The forensic team asks for authentication logs from the affected server — but the logs were rotated after 30 days and no central copy exists. The investigation stalls. A.8.15 ensures that security-relevant events are recorded, retained and protected from tampering so they are available when you need them most.
Logs are the foundation of detection, investigation and accountability. Without them, you cannot detect breaches, reconstruct attack timelines or prove compliance. This control covers the entire lifecycle: what to log, how to protect logs and how long to keep them.
What does the standard require?
- Define what to log. Specify which events are security-relevant and must be recorded: authentication, privilege use, data access, configuration changes, security alerts.
- Include sufficient detail. Each log entry must contain: timestamp, user ID, event type, source system, success/failure indicator and affected resource.
- Protect log integrity. Prevent unauthorized modification or deletion of logs through cryptographic hashing, append-only storage or write-once media.
- Centralize log collection. Forward logs from all systems to a central location for correlation and analysis.
- Define retention periods. Retain logs long enough to support investigations, compliance requirements and trend analysis.
- Protect sensitive log content. Logs may contain personal data or security-sensitive information — apply appropriate access controls.
In practice
Deploy centralized log management. Use a SIEM (Splunk, Elastic SIEM, Microsoft Sentinel) or a simpler log aggregation platform (Graylog, Loki). Forward logs from all servers, network devices, applications and cloud services.
Standardize log formats. Use structured formats (JSON, CEF, syslog) to enable automated parsing and correlation. Consistent formats reduce the effort needed to write detection rules and search queries.
Protect logs from tampering. Write logs to an append-only storage system. Use separate credentials for the log infrastructure that are independent of the production systems being monitored. An attacker who compromises a server should not be able to delete its logs.
Review logs regularly. Automated alerting catches known patterns, but human review catches anomalies that rules miss. Assign regular log review tasks — daily for critical systems, weekly for others.
Typical audit evidence
Auditors typically expect the following evidence for A.8.15:
- Logging policy — documented rules for what is logged, retention and access (see IT Operations Policy in the Starter Kit)
- SIEM or log management dashboard — evidence of centralized collection
- Log coverage report — percentage of systems forwarding logs to the central system
- Log integrity measures — configuration showing tamper protection
- Log review records — evidence of regular review activities
KPI
Percentage of critical systems with enabled and retained security logging
Measured as a percentage: how many critical systems actively forward security logs to the central log management system with retention meeting policy requirements? Target: 100%.
Supplementary KPIs:
- Log ingestion volume trends (for capacity planning)
- Mean time between security event and detection (measures log review effectiveness)
- Percentage of log sources with standardized formats
BSI IT-Grundschutz
A.8.15 maps to BSI modules for logging and security monitoring:
- OPS.1.1.5 (Logging) — the core module. Requires a logging policy, centralized collection, tamper protection and regular review.
- DER.1 (Detection of Security Events) — uses log data as the primary input for security event detection.
Related controls
- A.8.16 — Monitoring Activities: Monitoring analyses the logs that A.8.15 creates.
- A.8.17 — Clock Synchronization: Accurate timestamps are essential for log correlation.
- A.8.2 — Privileged Access Rights: Privileged activity logging is a core requirement.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.8.15 — Logging
- ISO/IEC 27002:2022 Section 8.15 — Implementation guidance for logging
- BSI IT-Grundschutz, OPS.1.1.5 — Logging