Your organization wants to ensure that security controls continue to function, helping to maintain an appropriate security posture. Which of the following is the BEST choice to meet this goal?
A. Auditing logs
B. Routine audits
C. Continuous security monitoring
D. Vulnerability scans
Answer: C. Continuous security monitoring