Using Automated Attack Emulation for Continuous Cybersecurity Control Validation