Log and Monitor

Lastly, it’s important to remember that security cannot be a “one and done” approach. You have to continuously monitor what’s going on within your environment. Collecting, managing and analyzing data logs are important ways to identify normal vs. anomalous activity and can help you detect, understand and recover from an attack. Use these tools to automate this process.