Your company is implementing a new containerized application using Amazon Elastic Container Service for Kubernetes (EKS). Which of the following steps should be taken to ensure comprehensive monitoring and alerting for security events in the EKS environment?