The organisation should establish authentication policies which facilitate the implementation of continuous monitoring through the deployment and configuration of systems to monitor and verify user identities during active sessions. If an activity is deemed high risk, such as a login from an unusual location or at an atypical time, additional authentication steps should be required to verify the user's identity.
Continuous authentication should be implemented technically by configuring systems to monitor user sessions. This setup should automatically trigger additional verification, such as multi-factor authentication, based on contextual risk factors. Such factors include access from unknown locations, use of new devices, or activity at unusual times.