During a security audit, which of the following is MOST important to review to ensure data confidentiality is managed?
A. Access controls
B. Data flows
C. Access log monitoring
D. Network configuration
A. Access controls
B. Data flows
C. Access log monitoring
D. Network configuration