Watch this video on YouTube
What is the purpose of performing information security continuous monitoring (ISCM)?