Watch this video on YouTube
For continuous monitoring to be effective, which of the following should be done to maintain situational awareness of the information system's security posture?