ISO 27001 Annex A 6.8 Information Security Event Reporting

Home / ISO 27001 Annex A Controls / ISO 27001 Annex A 6.8 Information Security Event Reporting

ISO 27001 Information Security Event Reporting

In this ultimate guide to ISO 27001 Annex A 6.8 Information Security Event Reporting you will learn

  • What is ISO 27001 Annex A 6.8
  • How to implement ISO 27001 Annex A 6.8

I am Stuart Barker, the ISO 27001 Ninja and author of the Ultimate ISO 27001 Toolkit.

With over 30 years industry experience I will show you what’s new, give you ISO 27001 templates, show you examples, do a walkthrough and show you how to implement it for ISO 27001 certification.

What is ISO 27001 Annex A 6.8 Information Security Event Reporting?

ISO 27001 Annex A 6.8 Information Security Event Reporting is an ISO 27001 control that wants you to implement a way for people to report information security events in a timely manner. You can have more than one way but have at least one.

ISO 27001 Annex A 6.8 Purpose

The purpose of ISO 27001 6.8 Information Security Event Reporting is to support the timely, consistent and effective reporting of actual or potential information security incidents / events.

ISO 27001 Annex A 6.8 Definition

The ISO 27001 standard defines ISO 27001 Annex A 6.8 as:

The organisation should provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.

ISO 27001:2022 Annex A 6.8 Information Security Event Reporting

DO IT YOURSELF

ISO 27001

ISO 27001 Toolkit Business Edition

ISO 27001 Annex A 6.8 Implementation Guide

You are going to have to

  • implement a process for reporting information security events
  • educate people how to report events
  • assign responsibility for managing information security events
  • educate people who to report events to

Implement your process

The process for reporting incidents and events can take many forms and you may choose one, some or all of them. Examples include reporting

  • Via email
  • Via an on line form
  • Via a telephone number
  • Via Messenger / Chat

Who does the report go to?

Typically incidents will get reported to the information security manager. While in a larger organisation or mature organisation the first point of call is usually a unified help desk or support function that acts as the coordinator and gatekeeper and then allocates that ticket to the information security manager.

How quickly should you report suspected or actual events?

People should report suspected or actual information security events as soon as possible / at the first opportunity. Significantly, there are some laws and regulations that have very specific timelines for reporting and what needs to happen, such as the GDPR so the guidance is to tell people report as soon as they can.

What are the kind of things that should be reported?

The guidance should be that if in doubt, report it. Better to air on the side of caution. That said, the kind of information security events that should be reported include but are not limited to:

  • Actual or suspect data breach
  • Information Security Controls that are not working
  • Loss of device
  • Emailing the wrong person
  • Physical security breach
  • Virus infection
  • Malware infection
  • Systems not working as intended
  • Ransomware
  • Phishing email / clicking a link
Stuart - High Table - ISO27001 Ninja - 3

ISO 27001 Templates

Having an ISO 27001 template for control 6.8 can help fast track your implementation. The ISO 27001 Toolkit is the ultimate resource for your ISO 27001 implementation.

How to comply with ISO 27001 Annex A 6.8

To comply with ISO 27001 Annex A 6.8 you are going to implement the ‘how’ to the ‘what’ the control is expecting. In short measure you are going to:

  • Implement your information security event reporting process
  • Have the process approved by management
  • Assign ownership of the process to competent resource
  • Tell people about the process
  • Include different channels for people to be able to report events
  • Plan to review your process at least annually or if significant changes occur
  • Keep records of your reported events

How to pass an audit of ISO 27001 Annex A 6.8

To pass an audit of ISO 27001 Annex A 6.8 you are going to make sure that you have followed the steps above in how to comply.

In essence, you are going to do that by first conducting an internal audit, following the How to Conduct an ISO 27001 Internal Audit Guide.

What will an audit check?

The audit is going to check a number of areas for compliance with Annex A 6.8. Lets go through them

1. That you have documented your process for event reporting

What this means is that you will have a document that sets out what the process for event reporting is and includes the roles and responsibilities are that are involved. It will cover the different ways in which events can be reported taking into account the culture and set up of the organisation. It will set out what needs doing and what will be done.

2. That you have allocated your roles and responsibilities

For the roles and responsible that you have defined and documented you are going to allocate people to them to do the work. Has each defined role been allocated to someone and can you say who if asked? In addition it will check that those people are competent to perform the roles.

3. That events were responded to in a timely manner

The definition of a timely manner will come down to your own circumstances but you are going to consider any legal or regulatory constraints that may be imposed. For example consider requirements for reporting data breaches under GDPR in 72 hours. The audit will check the reporting and response to incidents and that any time requirements were met.

Top 3 Mistakes People Make for ISO 27001 Annex A 6.8

In my experience, the top 3 mistakes people make for ISO 27001 Annex A 6.8 are

1. You have no evidence that anything actually happened

There needs to be records and minutes of everything. For evidence, you are need a paper trail to show it was done. Make sure you have updated communication plans, records of events, records of how you responded to events and in what timeframe. If it isn’t written down it didn’t happen.

2. One or more members of your team haven’t done what they should have done

Before the audit check that all members of the team have done what they should have. For example, do they know where the process documents are? Have events been recorded and do you know where that record it. If events led to risks or continual improvement can you show the link and evidence it. Check!

3. Your document and version control is wrong

The following are good document mark up best practice

  • Keeping your document version control up to date
  • making sure that version numbers match where used
  • having a review evidenced in the last 12 months
  • having documents that have no comments in

What are the benefits of ISO 27001 6.8 Information Security Event Reporting?

Other than your ISO 27001 certification requiring it, the following are the top 6 benefits of ISO 27001 Annex A 6.8 Information Security Event Reporting: 

  • You cannot get ISO 27001 certification without it.
  • Protecting confidential information
  • Reducing the risk of data breaches by catching events early
  • Mitigating legal liability by acting and responding
  • Building trust with employees and third parties
  • Reduced cost of incidents by catching and managing events early
  • Reputation Protection: In the event of a breach having an event reporting process in place will reduce the potential for fines and reduce the PR impact of an event

Why is Information Security Event Reporting Important?

All in all, information security event reporting is important because it helps organisations to

  • Identify and assess information security risks
  • Take corrective action to mitigate information security risks
  • Improve information security awareness and training
  • Demonstrate compliance with information security regulations

Firstly, it allows you to address the issue at hand in a timely manner and reduce the impact of the information security event. As a result, the sooner that you catch it, the less damage that it will do. Our worst case scenario is that an event goes undetected.

In fact, there are certain regulations, such as the GDPR that requires to report certain events within a certain time frame and as a result, to be compliant, we need effective reporting. In this situation, take for example a data breach of personal information which would potentially have to be reported to the regulator within 72 hours.

Additionally, information security event reporting can help you to identify and assess information security risks as part of your continual improvement process. Consequently, by collecting and recording the types of events and the impact and performing root cause analysis you are able to see if there is an underlying risk that needs addressing. At this point, if there is, it can be addressed by effective risk treatment.

ISO 27001 Annex A 6.8 FAQ

Are there free templates for ISO 27001 Annex A 6.8?

There are templates for ISO 27001 included in the High Table ISO 27001 Toolkit

Do I have to satisfy ISO 27001. Annex A 6.8 for ISO 27001 Certification?

Yes. The ability for people to report events in a timely manner is fundamental to an effective information security management system.

Where can I get templates for ISO 27001 Annex A 6.8?

ISO 27001 templates for ISO 27001 Annex A 6.8 are part of the High Table ISO 27001 Toolkit

How hard is ISO 27001 Annex A 6.8?

ISO 27001 Annex A 6.8 is not particularly hard. It can take a lot of time if you are doing it yourself but it is not technically very hard. We would recommend ISO 27001 templates to fast track your implementation.

How long will ISO 27001 Annex A 6.8 take me?

ISO 27001 Annex A 6.8 will take approximately 1 week to complete if you are starting from nothing and doing it yourself. Or you could download the High Table ISO 27001 Remote Working Policy.

How much will ISO 27001 Annex A 6.8 cost me?

The cost of ISO 27001 Annex A 6.8 will depend how you go about it. If you do it yourself it will be free but will take you about 1 week so the cost is lost opportunity cost as you tie up resource doing something that can easily be downloaded. If you download an ISO 27001 Template then you are looking at a around £10 per template.

What are examples of how people can report information security events?

Reporting is based on your company culture and communication strategy but can include:
Via email
Via an on line form
Via a telephone number
Via Messenger / Chat

ISO 27001 Controls and Attribute values

Control typeInformation security propertiesCybersecurity conceptsOperational capabilitiesSecurity domains
DetectiveAvailability
Confidentiality
Integrity
DetectInformation security event managementDefence

ISO 27001 QUICK LINKs

Organisational Controls - A5

ISO 27001 Annex A 5.1 Policies for information security

ISO 27001 Annex A 5.2 Information Security Roles and Responsibilities

ISO 27001 Annex A 5.3 Segregation of duties

ISO 27001 Annex A 5.4 Management responsibilities

ISO 27001 Annex A 5.5 Contact with authorities

ISO 27001 Annex A 5.6 Contact with special interest groups

ISO 27001 Annex A 5.7 Threat intelligence – new

ISO 27001 Annex A 5.8 Information security in project management

ISO 27001 Annex A 5.9 Inventory of information and other associated assets – change

ISO 27001 Annex A 5.10 Acceptable use of information and other associated assets – change

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.11 Return of assets

ISO 27001 Annex A 5.13 Labelling of information

ISO 27001 Annex A 5.14 Information transfer

ISO 27001 Annex A 5.15 Access control

ISO 27001 Annex A 5.16 Identity management

ISO 27001 Annex A 5.17 Authentication information – new

ISO 27001 Annex A 5.18 Access rights – change

ISO 27001 Annex A 5.19 Information security in supplier relationships

ISO 27001 Annex A 5.20 Addressing information security within supplier agreements

ISO 27001 Annex A 5.21 Managing information security in the ICT supply chain – new

ISO 27001 Annex A 5.22 Monitoring, review and change management of supplier services – change

ISO 27001 Annex A 5.23 Information security for use of cloud services – new

ISO 27001 Annex A 5.24 Information security incident management planning and preparation – change

ISO 27001 Annex A 5.25 Assessment and decision on information security events 

ISO 27001 Annex A 5.26 Response to information security incidents

ISO 27001 Annex A 5.27 Learning from information security incidents

ISO 27001 Annex A 5.28 Collection of evidence

ISO 27001 Annex A 5.29 Information security during disruption – change

ISO 27001 Annex A 5.31 Identification of legal, statutory, regulatory and contractual requirements

ISO 27001 Annex A 5.32 Intellectual property rights

ISO 27001 Annex A 5.33 Protection of records

ISO 27001 Annex A 5.34 Privacy and protection of PII

ISO 27001 Annex A 5.35 Independent review of information security

ISO 27001 Annex A 5.36 Compliance with policies and standards for information security

ISO 27001 Annex A 5.37 Documented operating procedures 

Technology Controls - A8

ISO 27001 Annex A 8.1 User Endpoint Devices

ISO 27001 Annex A 8.2 Privileged Access Rights

ISO 27001 Annex A 8.3 Information Access Restriction

ISO 27001 Annex A 8.4 Access To Source Code

ISO 27001 Annex A 8.5 Secure Authentication

ISO 27001 Annex A 8.6 Capacity Management

ISO 27001 Annex A 8.7 Protection Against Malware

ISO 27001 Annex A 8.8 Management of Technical Vulnerabilities

ISO 27001 Annex A 8.9 Configuration Management 

ISO 27001 Annex A 8.10 Information Deletion

ISO 27001 Annex A 8.11 Data Masking

ISO 27001 Annex A 8.12 Data Leakage Prevention

ISO 27001 Annex A 8.13 Information Backup

ISO 27001 Annex A 8.14 Redundancy of Information Processing Facilities

ISO 27001 Annex A 8.15 Logging

ISO 27001 Annex A 8.16 Monitoring Activities

ISO 27001 Annex A 8.17 Clock Synchronisation

ISO 27001 Annex A 8.18 Use of Privileged Utility Programs

ISO 27001 Annex A 8.19 Installation of Software on Operational Systems

ISO 27001 Annex A 8.20 Network Security

ISO 27001 Annex A 8.21 Security of Network Services

ISO 27001 Annex A 8.22 Segregation of Networks

ISO 27001 Annex A 8.23 Web Filtering

ISO 27001 Annex A 8.24 Use of CryptographyISO27001 Annex A 8.25 Secure Development Life Cycle

ISO 27001 Annex A 8.26 Application Security Requirements

ISO 27001 Annex A 8.27 Secure Systems Architecture and Engineering Principles

ISO 27001 Annex A 8.28 Secure Coding

ISO 27001 Annex A 8.29 Security Testing in Development and Acceptance

ISO 27001 Annex A 8.30 Outsourced Development

ISO 27001 Annex A 8.31 Separation of Development, Test and Production Environments

ISO 27001 Annex A 8.32 Change Management

ISO 27001 Annex A 8.33 Test Information

ISO 27001 Annex A 8.34 Protection of information systems during audit testing