Skip to content
AuditFront
A.5.28 ISO 27001

ISO 27001 A.5.28: Collection of evidence

What This Control Requires

The organization shall establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events.

In Plain Language

If you ever need to take an insider threat to court or demonstrate to a regulator exactly what happened during a breach, the quality of your evidence will make or break the case. Poorly collected evidence gets thrown out.

This control is about having defined procedures for handling both digital and physical evidence during security incidents. The key principle is forensic integrity - you need to collect evidence in a way that does not alter the original data, maintain a documented chain of custody, and store it securely against tampering.

The scope covers all evidence types: log files, disk images, network captures, memory dumps, physical documents, hardware, access records, emails, and screenshots. Your procedures also need to account for jurisdictional differences in evidence handling requirements if you operate across multiple locations.

How to Implement

Write evidence handling procedures covering the full lifecycle: identification, collection, preservation, analysis, presentation, and disposal. Align them with legal requirements in every jurisdiction you operate in.

For identification, define what evidence to collect for different incident types. Create checklists for common scenarios. Train responders to recognise and protect potential evidence sources from the moment they arrive at the scene.

For digital evidence collection, follow forensically sound methods. Image storage media rather than examining originals. Use write-blockers when imaging drives. Capture volatile evidence (memory, running processes, network connections) before powering anything down. Verify images with cryptographic hashes. Document everything: tools used, hash values, timestamps. Keep a validated forensic toolkit ready to go.

Implement chain of custody for all evidence. Use forms that record: what the evidence is, who collected it, when and where, how it has been stored, and every person who has handled it. Store evidence in a secure location with access controls and logging.

Protect log data that could serve as evidence. Centralise logging with tamper-evident controls. Set retention periods that meet both operational and legal needs. Use NTP for time synchronisation across all systems so timestamps are reliable. Protect log integrity through read-only storage, digital signing, or write-once media.

Line up external forensic specialists in advance for major incidents. Define when to bring them in - typically when there is potential criminal activity or a large-scale data breach. Make sure your internal procedures do not conflict with what external specialists or law enforcement will need.

Evidence Your Auditor Will Request

  • Documented evidence handling procedures covering identification, collection, and preservation
  • Chain of custody forms and completed examples from recent incidents
  • Forensic toolkit documentation and tool validation records
  • Centralized logging configuration with integrity and retention controls
  • Training records for personnel involved in evidence collection

Common Mistakes

  • No documented evidence handling procedures exist
  • Evidence is collected without maintaining chain of custody documentation
  • Digital evidence is collected in a forensically unsound manner, altering original data
  • Log data needed as evidence has been overwritten due to insufficient retention
  • Personnel are not trained in proper evidence collection techniques

Related Controls Across Frameworks

Framework Control ID Relationship
SOC 2 CC7.3 Partial overlap
SOC 2 CC7.4 Partial overlap
GDPR Art.33 Partial overlap

Frequently Asked Questions

What is chain of custody and why is it important?
It is a documented record tracking every person who has handled a piece of evidence from the moment it was collected. It records who picked it up, when, where it was stored, and every handoff between people. Without it, evidence can be challenged as potentially tampered with or contaminated, which may make it inadmissible in court or disciplinary proceedings. It sounds bureaucratic, but when you actually need the evidence to hold up, you will be glad you followed the process.
Do we need a dedicated forensic lab?
Probably not. Most organisations can get by with a forensic toolkit - validated imaging software, write-blockers, secure evidence storage - without a dedicated facility. For complex investigations, bring in external forensic specialists. What matters is having documented procedures, people trained to follow them, and the right tools on hand. Only organisations that regularly deal with complex forensic work (large financial institutions, government agencies) typically need a full lab.

Track ISO 27001 compliance in one place

AuditFront helps you manage every ISO 27001 control, collect evidence, and stay audit-ready.

Start Free Assessment