How to satisfy this control?

Long story short: company went through a review for ISO 27001 and was recommended to employ a SIEM.
We're using Symantec for our Anti-Virus and I'm thinking I might be able to find something that supports the SIEM functionality from them.
There's just one problem: the auditor said the SIEM must support some protection of logs that include tampering from admins.
In my mind, I don't know how that would be possible considering we're to be the ones to set it up in the first place. We're holding all the keys.
Any tips?
Tagged:
Comments
1. Enforce logging for all respective servers, hosts, network devices whereby they generate log events and send to a WORM device (log server) which is essentially a hardened host that prevents even admin from having permissions to tamper with the logs. Least privilege permissions for all.
4. If you ever require protection from tampering deploy FIM technology like tripwire.
Forum Admin at www.techexams.net
--
LinkedIn: www.linkedin.com/in/jamesdmurray
Twitter: www.twitter.com/jdmurray
Security Engineer/Analyst/Geek, Red & Blue Teams
OSCP, GCFA, GWAPT, CISSP, OSWP, AWS SA-A, AWS Security, Sec+, Linux+, CCNA Cyber Ops, CCSK
2021 goals: maybe AWAE or SLAE, bunch o' courses and red team labs?