Use of automated procedures to ensure security controls are not circumvented or the use of these tools to track actions taken by subjects suspected of misusing the information system.
See information security continuous monitoring.
Source(s):
CNSSI 4009-2015