Key aspects of continuous security monitoring