WikiFrameworksISO/IEC 27001:2022Collection of Evidence

Collection of Evidence

Updated: 2026-02-17

Plain English Translation

ISO 27001 Annex A.5.28 requires organizations to have a formal, documented process for gathering and protecting digital and physical evidence after a security incident. This ensures that any collected logs, memory dumps, or physical devices remain legally admissible and can be accurately analyzed without accidental tampering or destruction during the investigation.

Executive Takeaway

Mishandling evidence can ruin investigations and legal cases; organizations must enforce strict chain of custody and preservation protocols during incidents.

ImpactHigh
ComplexityHigh

Why This Matters

  • Ensures digital forensics and root cause analysis are based on untampered, accurate data
  • Proteents the legal admissibility of evidence for law enforcement investigations or civil litigation

What “Good” Looks Like

  • Incident response playbooks explicitly define evidence collection steps and chain of custody forms, and tools like WatchDog Security's Policy Management can help version-control those playbooks and track who has acknowledged the latest procedures.
  • Logs and forensic images are immediately stored in secure, read-only (WORM) environments to prove integrity, and tools like WatchDog Security's Secure File Sharing can help control evidence package access with audit logs and verified access when evidence must be distributed for review.

It is an organizational control that requires an entity to establish and implement procedures for identifying, collecting, acquiring, and preserving evidence related to information security events to ensure its integrity and admissibility.

Types of evidence include system and audit logs, network traffic captures (PCAPs), memory dumps, disk images, and physical devices such as compromised laptops or unauthorized removable media.

A defensible chain of custody is maintained by meticulously documenting who collected the evidence, when and how it was collected, who has had access to it since, and proving it has not been altered using cryptographic hashes.

The procedure should detail the scope of what constitutes evidence, roles authorized to collect it, approved forensic tools, chain of custody documentation requirements, and secure storage specifications.

Preserve logs by forwarding them in real-time to a secure, centralized log server (such as a SIEM) configured with Write-Once-Read-Many (WORM) storage or strict read-only access controls to prevent tampering.

Evidence collection should be handled by a trained Incident Responder or a designated digital forensics specialist, with the Incident Manager overseeing the process and legal counsel advising on preservation requirements.

Retention periods depend on legal hold requirements, regulatory obligations, and the organization's data retention policies, often spanning from several months to years depending on the jurisdiction and severity of the incident.

Common tools include write-blockers for physical disks, specialized imaging software (like FTK Imager or EnCase), memory capture utilities, and cloud-native snapshot features for virtual machines.

Store digital evidence in encrypted, access-controlled environments and generate SHA-256 hashes immediately upon collection to verify integrity later; physical evidence should be secured in locked safes.

Evidence collection is a critical phase within the broader incident response lifecycle (A.5.26), providing the raw, untampered data required for digital forensics and conducting thorough root cause analysis (A.5.27).

Evidence collection fails most often due to inconsistent procedures and missing documentation under pressure. WatchDog Security's Compliance Center can help by mapping A.5.28 requirements to a repeatable checklist, storing the approved chain-of-custody form as an evidence template, and flagging gaps (e.g., missing hashes, missing owner sign-off) before an audit.

Evidence often needs to be reviewed by multiple stakeholders, and uncontrolled sharing can create integrity and confidentiality risks. WatchDog Security's Secure File Sharing supports encrypted distribution with access controls, TOTP verification, and audit logs so you can demonstrate who accessed which evidence package and when, while keeping the original files protected.

ISO-27001 A.5.28

"The organization shall establish and implement procedures for the identification, collection, acquisition and preservation of evidence related to information security events."

VersionDateAuthorDescription
1.0.02026-02-17WatchDog Security GRC TeamInitial publication