Continuously observing and evaluating the information system security controls during the system life cycle to determine whether changes have occurred that will negatively impact the system security" best describes which process in the certification and accreditation methodology?
a. Continuous monitoring
b. Continuous improvement
c. Continuous management
d. Continuous development