The risk monitoring strategy needed to follow stringent process as discussed above to make sure that every potential risk is under control. The risks will be monitored with help of available software like Bitbucket and others to make sure that entire risks are inline properly. The review process and scheduling will be done based on the complexity of the risks associated in the process and will be assigned to the right stakeholder to mitigate the risks. The monitoring activities for risks are server issue, technology, design, development, bug, security user information, device, OS and application (Chande, 2005). The risks, threats and misuse of the information are the major issues in application development that will be monitored. Some of the risks like threats, bug, design will be occurring on frequent basis and so need proper monitoring time to time. The ongoing assessment and reviews will be done on bi monthly basis that will be security flaws, bugs in code, user information and more that need to take care on frequent basis.