Continuous monitoring
The concept of continuous monitoring stems from the understanding that an information system, if left unchecked, will gradually develop vulnerabilities that can be exploited. While IT and information security teams may excel in developing, securing, and testing a new information system, these efforts only capture a snapshot in time and can quickly become outdated. As new patches are released, and new exploit techniques emerge, information systems must be updated to address these evolving threats.
Continuous monitoring operates within the operations and maintenance phase of the SDLC. A continuous monitoring program should be established within an organization to ensure that security controls relating to people, processes, and technology are effectively monitored and continue to provide a robust defense against the ever-changing information security threat landscape.
Information security assessment automation
Information security assessment automation uses...