Continuous monitoring of security controls and their effectiveness
Audit trail collection and reporting
Determining acceptability of security controls in terms of risk
Enabling assessment of implementation and effectiveness of controls
Collecting and reporting on logs from all assets and activities