This document discusses the need for information security continuous monitoring (ISCM) within federal agencies. It outlines a risk management framework and seven-step ISCM strategy to continuously assess risks, security controls, and the overall security posture. The strategy involves defining goals, establishing metrics and assessment frequencies, implementing a monitoring program, analyzing data, responding to findings, and reviewing the program. It recommends anchoring the approach to a risk framework, prioritizing projects according to risk, maintaining situational awareness, and ensuring leadership support and system owner responsibility for effective continuous monitoring.