Skip to content
arrow_back
search
Annex A 8.16 verified ISO/IEC 27001:2022

Monitoring Networks and Systems for Anomalous Behaviour

Regularly check networks and systems for unusual activity to address potential security threats.

record_voice_over

Plain language

This control is about regularly checking your business's computers and networks for anything unusual. It's like making sure there are no strangers hanging out in your yard. If you don’t do this, you might miss signs of a cyber-attack or data breach that could harm your business.

Framework

ISO/IEC 27001:2022

Control effect

Detective

ISO 27001 domain

Technological controls

Classifications

N/A

Official last update

24 Oct 2022

Control Stack last updated

12 Apr 2026

Maturity levels

N/A

Official control statement

Networks, systems and applications shall be monitored for anomalous behaviour and appropriate actions taken to evaluate potential information security incidents.
verified ISO/IEC 27001:2022 Annex A 8.16
priority_high

Why it matters

Without continuous monitoring, anomalous activity (e.g., unauthorised access or lateral movement) can go unnoticed, increasing breach impact and service disruption.

settings

Operational notes

Baseline normal network/system activity, centralise and correlate logs (SIEM), tune alerts for anomalies, and define triage and escalation steps to evaluate potential incidents.

Mapping detail

Mapping

Direction

Controls