Continuous monitoring is a popular risk reduction technique in many large organizations with
formal certification processes for IT projects. In order to implement continuous monitoring in an
effective manner which of the following is correct?
A.
Only security related alerts should be forwarded to the network team for resolution.
B.
All logs must be centrally managed and access to the logs restricted only to data storage staff.
C.
Logging must be set appropriately and alerts delivered to security staff in a timely manner.
D.
Critical logs must be monitored hourly and adequate staff must be assigned to the network
team.