LOG-10 Continuous Monitoring

Estimated reading: 2 minutes 1055 views

What is LOG-10 continuous monitoring control?

Continuous monitoring control is about ensuring that the organization is using various monitoring tools or methods to continuously detect potential incidents. Continuous monitoring is one of the most important tools for any organization, and its goal is to provide organizations with immediate feedback and insight into performance and interactions across the network, applications, databases, and systems, which helps drive operational, security, and business performance.

Continuous monitoring control is achieved through a combination of all your monitoring processes. This can include internal and external assessments, penetration testing, using a tool such as TrustCloud, scanning, etc.

Available tools in the marketplace

The following listing is “crowdsourced” from our customer base or from external research. TrustCloud does not personally recommend any of the tools below, as we haven’t used them.


Available templates

TrustCloud has a curated list of templates, internally or externally sourced, to help you get started. Click on the link for a downloadable version:

  • N/A: No template recommendation

Control implementation

To implement this control,

You must demonstrate that there are various monitoring tools in place. You can refer to a combination of controls to meet this requirement.

Monitoring controls can include logging and monitoring; external penetration testing; vulnerability scanning; internal audits; and compliance management tools such as TrustCloud.

What evidence do auditors look for?

Most auditors, at a minimum, are looking for the below-suggested action:

  • List of monitoring tools and mechanisms in place

Evidence example

For the suggested action, an example is provided below:

  1. List of monitoring tools and mechanisms in place.
    The following screenshot shows monitoring tools and mechanisms.
    LOG 10 Continuous Monitoring 01

Join the conversation

You might also be interested in

Documentation Templates

Documentation Templates are documents that provide a content outline to meet certain documentation needs....

Backup policy template – Download for free

The Data Backup Plan template helps you document in detail the data backup needs...

HR-13 Employee Handbook/Code of Conduct

HR-13 Employee Handbook or Code of Conduct communicates the organization’s values and ethics. It...

AUTH-1 Single Sign On (SSO)

Single Sign On (SSO) Control is a best practice recommendation for critical systems....

Security Incident Report Template

The Security Incident Report template helps you document the steps used to assess and...

BIZOPS-6 Disaster Recovery Testing

BIZOPS-6 Disaster Recovery Testing control refers to the exercise of identifying the critical systems...

PDP-10 SDLC – Separation of environments

PDP-10 SDLC Separation of Environments is important to maintain separate environments to develop, test,...

Privacy Committee Charter Template

Privacy Committee Charter serves as a foundational document, establishing the framework for the committee's...