This book provides an understanding of continuous monitoring principles by describing requirements and solutions currently in use in both public and private sectors. It assists readers through a description of best practices related to planning, implementing, and operating a continuous monitoring program as part of an overall, enterprise-wide information security program. It also addresses special issues affecting continuous monitoring, including protection of privacy, cloud-based continuous monitoring, limitations of continuous monitoring, and the U.S. government's Continuous Diagnostics & Mitigation (CDM) Program.