Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Introduction

In a Security by Design approach, security monitoring is not an afterthought or a bolt-on activity introduced after deployment. Rather, it is a core architectural capability that must be designed into systems from the outset. While prevention strives to stop attacks before they occur, security monitoring assumes that some threats will inevitably bypass even the best preventative controls. The question is not if a breach might occur, but when—and how quickly you will know about it.

Security monitoring is the practice of continuously observing, collecting, and analysing security-relevant data from across your systems to detect potential incidents, unusual behaviour, or policy violations. It transforms raw telemetry—logs, metrics, network flows, and user activity—into actionable intelligence that enables security teams to distinguish between routine operations and malicious activity.

Crucially, monitoring is not synonymous with logging. Logging is the recording of events; monitoring is the active interpretation of those events to identify anomalies, trigger alerts, and inform response. Without monitoring, logs are little more than forensic artefacts for post-breach investigation. With monitoring, they become a real‑time sensor network that provides visibility, situational awareness, and early warning.

In Security by Design, effective monitoring requires deliberate architectural decisions: what to monitor, where to collect data, how to protect the monitoring pipeline from tampering, and how to ensure alerts are actionable rather than overwhelming. When designed correctly, security monitoring not only detects attacks but also validates that preventative controls are working as intended and provides evidence for compliance, audit, and continuous improvement.

Learning Objectives

By the end of this section, you will be able to:

Sections

Learn more about security monitoring as a core Security by Design capability in the following sections: