This could be anywhere from a few months, to a few years, to (rarely) indefinite. Even though the system has gone through full scrutiny and accreditation, security of the system is not over. Having a consistently updated continuous monitoring strategy will help maintain the security health of the system, and make re-accreditation of the system easier the second time around.DeliverablesSubmit an APA-formatted paper, 1250 words minimum (at least 5 pages), that includes all deliverables listed below.Reminder: Assume you are using your home computer for work, connecting to the company network through a Virtual Private Network (VPN).Create a Continuous Monitoring strategy. At a minimum, this strategy should address : a) Frequency and depth of reviewing security audit logs. b) Frequency and depth of vulnerability scans. c) Frequency and depth of personnel background investigations. d) Frequency of account review and removing access for inactive/terminated users. e) Frequency and depth of reviewing physical security controls. f) Frequency of reviewing and updating open items in the POA