- Supporting ongoing information system and common controls authorization through the implementation of continuous monitoring processes.
- Incorporating information security and privacy controls and protections into the full data, applications, and systems development life cycle.