Watch this video on YouTube
The NIST Special Publication on Assessing Information Security Continuous Monitoring (ISCM) Programs organizes the ISCM process into six steps. Which of the following is not a step in the process?