Chapter 5

Continuous Monitoring: Extremely Valuable to Deploy within Reason

Foster J. Henderson and Mark A. Podracky

Introduction

Given the media coverage of the U.S. government’s information technology (IT) continuous monitoring requirements over the last 12 months, it is understandable how some individuals may have been led to believe that continuous monitoring is something new. The requirement to perform continuous monitoring has been around even before the Federal Information Security Management Act (FISMA) of 2002 was enacted. For example, the ...

Get Information Security Management Handbook, Volume 6, 6th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.