The information security technician wants to ensure security controls are deployed and functioning as intended
to be able to maintain an appropriate security posture. Which of the following security techniques is MOST
appropriate to do this?
Continuous security monitoring
A security baseline is the security setting of a system that is known to be secure. This is the initial security
setting of a system. Once the baseline has been applied, it must be maintained or improved. Maintaining the
security baseline requires continuous monitoring.